Sr. Consultant - SOC-L3 Job

Pune, IN

Yash Technologies

YASH Technologies is a leading Digital Solution Company for Business IT Solutions. YASH is a Right Sized Technology Partner of Choice.

View all jobs at Yash Technologies

Apply now Apply later

YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation.

 

At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future.

 

We are looking forward to hire SOC1&2 Professionals in the following areas :

 

What you should have?

  • At least 5 years of experience in Cyber Security Projects covering Cyber Security Consulting, Cyber Threat ,Cyber Forensic Management.

    Knowledge of Azure, AWS or Google Cloud

    Knowledge of SIEM, Cloud Access Security Broker, Data Leakage Prevention, Web Application Firewall, Multi Factor Authentication, Data Rights Management, Identity Access/Privileged Access Management.

    Cloud security capabilities and possible interfaces with on-prem security solutions.

    Ability to gather business requirements; select, test, and implement tools and applications.

    Ability to work creatively and analytically in a problem-solving environment.

    Responsive, problem-solving orientation and ability to build strong relationships with all levels of stakeholders.

    Ability to work in a dynamic and fast-paced environment.

    Administrative, presentation, project management skills and the ability to manage multiple task.

    Experience in leading teams of varying sizes

    Coordinate with counterparts to develop, implement, maintain, monitor and support company-wide best practices of all corporate infrastructure IT security including areas of networks, applications, and endpoints devices.

    Install security measures and operate software to protect systems and information infrastructure, including assisting firewalls security rules and data security implementation.

    Align security objectives with business goals to enforce changes with minimal support workload increases

    Review and work with internal teams to remediate security concerns in cloud environments

    Implement security measures and tune existing tools to further enforce zero trust monitorning for MDR model Delivery

    Design and implement innovative approaches to endpoint protection, malware detection & mitigation, and auditing.

    Collaborate within IT to deploy secure baselines and fix detected vulnerabilities to maintain a high-security standard

    Provide data and root cause analysis of security incidents with corrective actions for improvement.

    Work with the internal security team and analyze false positives and false negatives.

    Monitor computer networks for security issues and investigate security breaches and other cyber incidents

    Closely working with compliance and internal audit departments to ensure IT controls are in place, enforced, maintained and provide evidence samples according to the requirement.

    Configure, maintain, and support internal uses of Security solution in trial and production implementation, post deployemnet of solution with required usecase controls (self-study), provide required documentation and onboard Operations team with required tranings.

    Work closely with internal various customer conterparts to onboard all required assets (CEF, Smart connecters, Data Connectors, develop lighthouse) to maintain corporate instances to ensure update to date security parameters, implementations, and best practices.

    Create security metrics, reports, and dashboards

    Stay up-to-date on information technology trends and security standards

What you will do / Responsibilities

  • Deep understanding of cloud architecture and cloud security challenges and solutions, as well as operating systems (Windows/MacOS/Linux), networking, authentication, and programming and scripting languages.

    Understanding of network connectivity concepts, including IP address allocation, tunneling, L2/L3, firewalls, IDS

    Good knowledge of IT Security, SSL/TLS, TCP/IP, HTTP and DNS.

    Experience of security appliances & applications. Hands on in configuration of content filtering, firewall rules, proxy, packet inspection, DLP, vulnerability & threat detection, etc.

    Experience and familiarity with information security tools and concepts, e.g. IT Compliances, IT general controls, anti-virus/malware, scanning software, identify and access management, endpoint security, vulnerability management, software update processes, etc.

    Experience with log analysis, event correlation, incident management procedures and systems

    Network troubleshooting experience - Familiarity with tools such as Ping, Traceroute, MTR, and Network Protocol Analysers such as tcpdump, Wireshark

    Must have excellent reporting and analytical skills.

Professional Attributes :

1. Strong analytical skills with a structured problem-solving approach

2. Effective communicator with great interpersonal skills and the ability to be credible with clients

3. Strong project/program management experience

4. Demonstrated creativity in complex problem solving and ability to work under pressure"

Educational Qualification :

Bachelors or above degree in a related field or equivalent full-time course.

Technical Certifications   :

AZ 500, AZ 900, CISSP, CEH, CSSP

 

At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale.

 

Our Hyperlearning workplace is grounded upon four principles

  • Flexible work arrangements, Free spirit, and emotional positivity
  • Agile self-determination, trust, transparency, and open collaboration
  • All Support needed for the realization of business goals,
  • Stable employment with a great atmosphere and ethical corporate culture
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  0  0
Category: Consulting Jobs

Tags: Agile Audits AWS Azure CASB CEH CISSP Cloud Compliance DNS Endpoint security Firewalls GCP IDS Linux Log analysis MacOS Malware Scripting SIEM SOC SOC 1 TCP/IP Threat detection TLS Vulnerabilities Vulnerability management Windows Zero Trust

Perks/benefits: Flex hours Transparency

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.