Cyber MS MDR - L1
Bangalore, Karnataka, India
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
Function: KGS Response Team
Position: Level 1 Security Analyst/Associate Consultant
Location: Bangalore
Roles and Responsibilities
The primary role of a Security Analyst (L1) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists,and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution.
Specifically, Security Analysts (L1) will:
- Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:
- Firewalls
- Systems and Network Devices
- Web Proxies
- Intrusion Detection/Prevention Systems
- Data Loss Prevention
- EDR / Antivirus Systems
- Knowledgebase Framework (Confluence)
- Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:
- SIEM alert queue
- Security email inbox
- Intel feeds via email and other sources (e.g. NH-ISAC)
- Incident Ticketing queue (IT Security group)
- Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context
- Perform triage of service requests from customers and internal teams
- Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation
- Assist with containment of threats and remediation of environment during or after an incident
- Act as a participant during Threat Hunting activities at the direction of one or more Incident Response Handlers
- Document event analysis and write comprehensive reports of incident investigations
- Proactively improve security-related operational processes and procedures
- Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools
- Maintain operational shift logs with relevant activity from the Analyst’s shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis
- Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingest of daily intelligence reports and previous shift logs
- Conduct research and document events of interest within the scope of IT Security
Qualifications
- Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field
- 0-1 years of prior MDR/SOC/Incident response experience
- Act as a workstream participant to support tier-1, tier-2, or tier-3 SOC environments
- Demonstrated strong oral and written communication and client facing skills
- Demonstrated strong analytical and communications skills
- Flexibility to adapt to different types of engagement, working hours, work environments, and locations
- Proven ability to work creatively, analytically in a problem-solving environment
- Ability to work nights, weekends, and/or holidays in the event of an incident response emergency
- Be comfortable working against deadlines in a fast-paced environment
- Identify issues, opportunities for improvement, and communicate them to an appropriate senior member
Required skills:
- Familiarity with any SIEM tool (Qradar, Splunk, Logrhythm, Sentinel etc.)
- Familiarity with Email Security, especially, analysis for Phishing Emails.
- Familiarity with incident response process and activities
- Familiarity with TCP/IP protocol, OSI Seven Layer Model
- Must have a basic understanding of information technology, information security domains
- Knowledge of security best practices and concepts
- Desired certifications: ISC2 CC (ISC2 Cyber Security), Security+, C|EH, Network+, ECIH (EC Council’s Incident Handler)
- Familiarity with ticketing tool / ITSM tool
- Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations
Function: KGS Response Team
Position: Level 1 Security Analyst/Associate Consultant
Location: Bangalore
Roles and Responsibilities
The primary role of a Security Analyst (L1) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists,and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution.
Specifically, Security Analysts (L1) will:
- Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:
- Firewalls
- Systems and Network Devices
- Web Proxies
- Intrusion Detection/Prevention Systems
- Data Loss Prevention
- EDR / Antivirus Systems
- Knowledgebase Framework (Confluence)
- Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:
- SIEM alert queue
- Security email inbox
- Intel feeds via email and other sources (e.g. NH-ISAC)
- Incident Ticketing queue (IT Security group)
- Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context
- Perform triage of service requests from customers and internal teams
- Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation
- Assist with containment of threats and remediation of environment during or after an incident
- Act as a participant during Threat Hunting activities at the direction of one or more Incident Response Handlers
- Document event analysis and write comprehensive reports of incident investigations
- Proactively improve security-related operational processes and procedures
- Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools
- Maintain operational shift logs with relevant activity from the Analyst’s shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis
- Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingest of daily intelligence reports and previous shift logs
- Conduct research and document events of interest within the scope of IT Security
Qualifications
- Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field
- 0-1 years of prior MDR/SOC/Incident response experience
- Act as a workstream participant to support tier-1, tier-2, or tier-3 SOC environments
- Demonstrated strong oral and written communication and client facing skills
- Demonstrated strong analytical and communications skills
- Flexibility to adapt to different types of engagement, working hours, work environments, and locations
- Proven ability to work creatively, analytically in a problem-solving environment
- Ability to work nights, weekends, and/or holidays in the event of an incident response emergency
- Be comfortable working against deadlines in a fast-paced environment
- Identify issues, opportunities for improvement, and communicate them to an appropriate senior member
Required skills:
- Familiarity with any SIEM tool (Qradar, Splunk, Logrhythm, Sentinel etc.)
- Familiarity with Email Security, especially, analysis for Phishing Emails.
- Familiarity with incident response process and activities
- Familiarity with TCP/IP protocol, OSI Seven Layer Model
- Must have a basic understanding of information technology, information security domains
- Knowledge of security best practices and concepts
- Desired certifications: ISC2 CC (ISC2 Cyber Security), Security+, C|EH, Network+, ECIH (EC Council’s Incident Handler)
- Familiarity with ticketing tool / ITSM tool
- Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations
Function: KGS Response Team
Position: Level 1 Security Analyst/Associate Consultant
Location: Bangalore
Roles and Responsibilities
The primary role of a Security Analyst (L1) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists,and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution.
Specifically, Security Analysts (L1) will:
- Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to:
- Firewalls
- Systems and Network Devices
- Web Proxies
- Intrusion Detection/Prevention Systems
- Data Loss Prevention
- EDR / Antivirus Systems
- Knowledgebase Framework (Confluence)
- Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including:
- SIEM alert queue
- Security email inbox
- Intel feeds via email and other sources (e.g. NH-ISAC)
- Incident Ticketing queue (IT Security group)
- Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context
- Perform triage of service requests from customers and internal teams
- Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation
- Assist with containment of threats and remediation of environment during or after an incident
- Act as a participant during Threat Hunting activities at the direction of one or more Incident Response Handlers
- Document event analysis and write comprehensive reports of incident investigations
- Proactively improve security-related operational processes and procedures
- Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools
- Maintain operational shift logs with relevant activity from the Analyst’s shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis
- Update/reference knowledgebase tool (e.g. Confluence) as necessary for changes to processes and procedures, and ingest of daily intelligence reports and previous shift logs
- Conduct research and document events of interest within the scope of IT Security
Qualifications
- Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field
- 0-1 years of prior MDR/SOC/Incident response experience
- Act as a workstream participant to support tier-1, tier-2, or tier-3 SOC environments
- Demonstrated strong oral and written communication and client facing skills
- Demonstrated strong analytical and communications skills
- Flexibility to adapt to different types of engagement, working hours, work environments, and locations
- Proven ability to work creatively, analytically in a problem-solving environment
- Ability to work nights, weekends, and/or holidays in the event of an incident response emergency
- Be comfortable working against deadlines in a fast-paced environment
- Identify issues, opportunities for improvement, and communicate them to an appropriate senior member
Required skills:
- Familiarity with any SIEM tool (Qradar, Splunk, Logrhythm, Sentinel etc.)
- Familiarity with Email Security, especially, analysis for Phishing Emails.
- Familiarity with incident response process and activities
- Familiarity with TCP/IP protocol, OSI Seven Layer Model
- Must have a basic understanding of information technology, information security domains
- Knowledge of security best practices and concepts
- Desired certifications: ISC2 CC (ISC2 Cyber Security), Security+, C|EH, Network+, ECIH (EC Council’s Incident Handler)
- Familiarity with ticketing tool / ITSM tool
- Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Antivirus C Computer Science Confluence EDR Firewalls Incident response Intrusion detection LogRhythm Monitoring QRadar Sentinel SIEM SOC Splunk TCP/IP
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.