REF46108Q - SOC(SIEM , EDR , QRadar, Splunk) - Analyst -2-5 yrs - Mumbai

Mumbai, India

Apply now Apply later

Company Description

WNS (Holdings) Limited (NYSE: WNS), is a leading Business Process Management (BPM) company. We combine our deep industry knowledge with technology and analytics expertise to co-create innovative, digital-led transformational solutions with clients across 10 industries. We enable businesses in Travel, Insurance, Banking and Financial Services, Manufacturing, Retail and Consumer Packaged Goods, Shipping and Logistics, Healthcare, and Utilities to re-imagine their digital future and transform their outcomes with operational excellence.We deliver an entire spectrum of BPM services in finance and accounting, procurement, customer interaction services and human resources leveraging collaborative models that are tailored to address the unique business challenges of each client. We co-create and execute the future vision of 400+ clients with the help of our 44,000+ employees.

Job Description

2-4 years of experience in 24x7 (rotating shifts) monitoring at a Security Operations centre on SIEM solutions (Qradar)·

Triage, analyze & respond to SIEM events with articulate analysis and clear response guidance/questions to other teams through established collaboration mechanisms (Ticketing systems, Mails)

Good understanding of EDR Solutions (McAfee EDR, Crowd strike EDR).

Leverage the Operational & Tactical Threat Intel data from the established feeds & sources to detect Threats

Ability to efficiently utilize to log analytics and usage of QRadar for analyzing & filtering logs.

Optimizes threat detection products for data security information and event management (SIEM), advanced email protection, endpoint detection and response (EDR), antivirus, intrusion detection systems, firewalls, proxies, and other industry standard security technologies

Works closely with Level 2 & Level 3 team towards the continuous improvement of the service.

Should have understanding on TCP/IP network traffic and event log analysis.

Experience working in a Threat Intel team or Threat Hunting team would be a bonus.

Good Knowledge on Incident management life cycle and contribute to the development and improvement of security detection, Incident response process and solutions are required to support ongoing operations.

Qualifications

Bachelor's Degree

Additional Information

12X7 support

work from Office

Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  4  0  0
Category: Analyst Jobs

Tags: Analytics Antivirus Banking EDR Finance Firewalls Incident response Intrusion detection Log analysis Monitoring QRadar SIEM SOC Splunk TCP/IP Threat detection

Perks/benefits: Team events

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.