Sr. Consultant - SOC-L3 Job
Pune, IN
Yash Technologies
YASH Technologies is a leading Digital Solution Company for Business IT Solutions. YASH is a Right Sized Technology Partner of Choice.YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation.
At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future.
We are looking forward to hire SOC1&2 Professionals in the following areas :
What you should have?
-
At least 5 years of experience in Cyber Security Projects covering Cyber Security Consulting, Cyber Threat ,Cyber Forensic Management.
Knowledge of Azure, AWS or Google Cloud
Knowledge of SIEM, Cloud Access Security Broker, Data Leakage Prevention, Web Application Firewall, Multi Factor Authentication, Data Rights Management, Identity Access/Privileged Access Management.
Cloud security capabilities and possible interfaces with on-prem security solutions.
Ability to gather business requirements; select, test, and implement tools and applications.
Ability to work creatively and analytically in a problem-solving environment.
Responsive, problem-solving orientation and ability to build strong relationships with all levels of stakeholders.
Ability to work in a dynamic and fast-paced environment.
Administrative, presentation, project management skills and the ability to manage multiple task.
Experience in leading teams of varying sizes
Coordinate with counterparts to develop, implement, maintain, monitor and support company-wide best practices of all corporate infrastructure IT security including areas of networks, applications, and endpoints devices.
Install security measures and operate software to protect systems and information infrastructure, including assisting firewalls security rules and data security implementation.
Align security objectives with business goals to enforce changes with minimal support workload increases
Review and work with internal teams to remediate security concerns in cloud environments
Implement security measures and tune existing tools to further enforce zero trust monitorning for MDR model Delivery
Design and implement innovative approaches to endpoint protection, malware detection & mitigation, and auditing.
Collaborate within IT to deploy secure baselines and fix detected vulnerabilities to maintain a high-security standard
Provide data and root cause analysis of security incidents with corrective actions for improvement.
Work with the internal security team and analyze false positives and false negatives.
Monitor computer networks for security issues and investigate security breaches and other cyber incidents
Closely working with compliance and internal audit departments to ensure IT controls are in place, enforced, maintained and provide evidence samples according to the requirement.
Configure, maintain, and support internal uses of Security solution in trial and production implementation, post deployemnet of solution with required usecase controls (self-study), provide required documentation and onboard Operations team with required tranings.
Work closely with internal various customer conterparts to onboard all required assets (CEF, Smart connecters, Data Connectors, develop lighthouse) to maintain corporate instances to ensure update to date security parameters, implementations, and best practices.
Create security metrics, reports, and dashboards
Stay up-to-date on information technology trends and security standards
What you will do / Responsibilities
-
Deep understanding of cloud architecture and cloud security challenges and solutions, as well as operating systems (Windows/MacOS/Linux), networking, authentication, and programming and scripting languages.
Understanding of network connectivity concepts, including IP address allocation, tunneling, L2/L3, firewalls, IDS
Good knowledge of IT Security, SSL/TLS, TCP/IP, HTTP and DNS.
Experience of security appliances & applications. Hands on in configuration of content filtering, firewall rules, proxy, packet inspection, DLP, vulnerability & threat detection, etc.
Experience and familiarity with information security tools and concepts, e.g. IT Compliances, IT general controls, anti-virus/malware, scanning software, identify and access management, endpoint security, vulnerability management, software update processes, etc.
Experience with log analysis, event correlation, incident management procedures and systems
Network troubleshooting experience - Familiarity with tools such as Ping, Traceroute, MTR, and Network Protocol Analysers such as tcpdump, Wireshark
Must have excellent reporting and analytical skills.
Professional Attributes :
1. Strong analytical skills with a structured problem-solving approach
2. Effective communicator with great interpersonal skills and the ability to be credible with clients
3. Strong project/program management experience
4. Demonstrated creativity in complex problem solving and ability to work under pressure"
Educational Qualification :
Bachelors or above degree in a related field or equivalent full-time course.
Technical Certifications :
AZ 500, AZ 900, CISSP, CEH, CSSP
At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale.
Our Hyperlearning workplace is grounded upon four principles
- Flexible work arrangements, Free spirit, and emotional positivity
- Agile self-determination, trust, transparency, and open collaboration
- All Support needed for the realization of business goals,
- Stable employment with a great atmosphere and ethical corporate culture
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Audits AWS Azure CASB CEH CISSP Cloud Compliance DNS Endpoint security Firewalls GCP IDS Linux Log analysis MacOS Malware Scripting SIEM SOC SOC 1 TCP/IP Threat detection TLS Vulnerabilities Vulnerability management Windows Zero Trust
Perks/benefits: Flex hours Transparency
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.