Analyst

Telangana, India

Apply now Apply later

Total experience 3 years as Cyber Security Analyst.

Knowledge on LogRhythm SIEM tool. Incident handling.

 

Job description

2-3 years of Experience in SIEM analyst and incident handling.

B.E/B.Tech

 

Roles and Responsibilities:

 

  • 3+ years experience as a SOC analyst and any SIEM tool.
  • Min 2+ years experience on LogRhythm SIEM.
  • Responsible for alerts monitoring and incident handling.
  • Perform the initial analysis and identify if any potential threat.
  • Analyse security alerts and determine their validity and potential impact on the organization.
  • Review and analyse security logs from various sources (e.g., firewalls, intrusion detection/prevention systems, and endpoint protection)
  • Correlating logs from various security controls to gather more insight of the suspected event.
  • Regularly preparing log monitoring reports and daily security report and proactively work on it.
  • Document security incidents, including the steps taken to resolve them and any lessons learned.
  • Ensure compliance with security policies, procedures, and regulatory requirement
  • Work closely with other IT and security team members to enhance overall security posture.
  • Coordinate with the L2 and L3 for any escalations.
  • Knowledge on cyber kill chain and MITRE Attack frameworks and mythologies.
  • Knowdledge on various cyber attacks in Cyber security world.

 

Certifications:

  • LogRhythm Security Analyst (LRSA) from LogRhythm University
  • CEH

 

 

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  0  0
Category: Analyst Jobs

Tags: CEH Compliance Cyber Kill Chain Firewalls Intrusion detection LogRhythm Monitoring SIEM SOC

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.