Security Consultant
Remote Home, HW, US, 99999
Atos
Atos is a global leader in digital transformation with 105,000 employees and annual revenue of c. € 11 billion.The future is our choice
At Atos, as the global leader in secure and decarbonized digital, our purpose is to help design the future of the information space. Together we bring the diversity of our people’s skills and backgrounds to make the right choices with our clients, for our company and for our own futures.
Security Analyst - MDR (SOC)
Experience Range: 2-3 years of relevant experience in cyber security.
Required Qualifications:
- Strong analytical and technical skills in computer network defense operations
- Incident response Handling (Detection, Analysis, Triage, Recommendations)
- Performing advance investigation of security incidents (reported by L1 & L2 Analyst) using tools and technologies (Splunk, Paloalto, PPT, Zingbox, EDR etc)
- Prepare weekly SOC incident debrief for management & client executive summary report.
- Review and support new use-case & fine tuning, create and maintain process document and SOP.
- Identifying new use-case scope, finetuning scope and give suggestions.
- Identify the devices with no use-case in splunk, SIEM and propose industry based good to have use-cases
- 24/7 On-Call support for critical incidents, investigate, document the finding and create RCA as applicable.
- Experience handling high priority Security Incidents
- Hunting (anomalous pattern detection and content management).
- Prior experience of investigating security events.
- Should be able to distinguish incidents as opposed to non-incidents.
Desired Qualifications:
• Relevant Certifications: CEH, CISSP, Security+, or related certification.
• Bachelor's Degree in Information Technologies, Cyber Security, or a related field.
- Experience with some/all: SIEM, SPLUNK, EDR, Phishing tools, SNOW, Infoblox, palo alto, IOTs, Malware investigation, Critical security incident investigation and etc
Key Responsibilities:
• Monitor for threats, analyze, and notify customer.
• Working in a 24x7 Security Operation Center (SOC) environment.
• Security Log analysis to detect attack origin, attack spread, attacker details, incident details.
• Incident Response when analysis confirms actionable incident.
• Analyze and respond to previously undisclosed software and hardware vulnerabilities.
• Investigate, document, and report on incident.
• Integrate and share information with other analysts and other teams.
• Other tasks and responsibilities as assigned.
• Interface with customers daily to consult with them on best security practices and help them mature their security posture.
The candidates should have:
• Good verbal & written communication skills
• Good understanding of networking concepts
• Good understanding of Windows and Unix basics
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: CEH CISSP EDR Incident response Log analysis Malware SIEM SOC Splunk UNIX Vulnerabilities Windows
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.