Analyst I, Info Security (SOC)

Pune

Your Future Evolves Here

Evolent Health has a bold mission to change the health of the nation by changing the way health care is delivered. Our pursuit of this mission is the driving force that brings us to work each day. We believe in embracing new ideas, challenging ourselves and failing forward. We respect and celebrate individual talents and team wins. We have fun while working hard and Evolenteers often make a difference working in everything from scrubs to jeans.

Are we growing? Absolutely and Globally. In 2021 we grew our teams by almost 50% and continue to grow even more in 2022. Are we recognized as a company you are supported by for your career and growth, and a great place to work? Definitely. Evolent Health International (Pune, India) has been certified as “Great Places to Work” in 2021. In 2020 and 2021 Evolent in the U.S. was both named Best Company for Women to Advance list by Parity.org and earned a perfect score on the Human Rights Campaign (HRC) Foundation’s Corporate Equality Index (CEI). This index is the nation's foremost benchmarking survey and report measuring corporate policies and practices related to LGBTQ+ workplace equality.

We recognize employees that live our values, give back to our communities each year, and are champions for bringing our whole selves to work each day. If you’re looking for a place where your work can be personally and professionally rewarding, don’t just join a company with a mission. Join a mission with a company behind it.

What You’ll Be Doing:

Job Description:

We are seeking a highly motivated and skilled Security Operations Center (SOC) Analyst to join our team. The SOC Analyst will be responsible for monitoring, analyzing, and responding to security events and incidents in a SOC environment. The successful candidate will have experience with security information and event management (SIEM) systems, including Splunk Enterprise Security, and possess knowledge of threat and vulnerability analysis.


Responsibilities:

  • Monitor and respond to security events in SOC environment.
  • Use SIEM technology, including Elastic SIEM, to perform event monitoring and investigate and triage events.
  • Manage user accounts, create dashboards, and configure Splunk for optimal performance.
  • Develop operational and executive dashboards, reports, alerts, visualizations, and optimize searches to support SOC operations.
  • Perform proactive monitoring and response of known and emerging threats against the network.
  • Provide analysis and trending of security log data from various devices.
  • Participate in the Incident Response (IR) process and support when analysis confirms actionable incidents.
  • Investigate, document, and report on information security issues and emerging trends.
  • Recognize and investigate intrusion attempts and differentiate false positives from true intrusion attempts.
  • Familiar with malware analysis and cyber threat intelligence.
  • Respond to and remediate P1 and P2 incidents as part of on-call duties.
  • Participate in Critical incidents as part of an Incident Response Team.
  • Provide expertise in managing Splunk Enterprise Security platform.
  • Familiarity with SIEM architecture, integration, and configure log sources for a variety of environments.
  • Knowledge of Windows and Linux platforms, security applications like EDR CrowdStrike, Zscaler, Azure identity Protection, etc.


Qualifications:
Bachelor's degree in Computer Science, Information Security, or a related field.

  • Minimum of 3 years of experience in a Security Operations Center (SOC) environment.
  • Experience with SIEM technology, including Splunk Enterprise Security, and log management.
  • Familiarity with threat and vulnerability analysis, malware analysis, and cyber threat intelligence.
  • Experience with incident response, including participation in Critical incidents as part of an Emergency Response Team (ERT).
  • Knowledge of Windows and Linux platforms, security applications like EDR CrowdStrike, Zscaler Azure identity Protection, etc.
  • Excellent written and verbal communication skills.
  • Strong analytical and problem-solving skills.
  • Ability to work independently and as part of a team.
  • Willingness to work in a 24x7 SOC environment and participate in on-call duties.

Mandatory Requirements:

We require that all employees have the following technical capability at their home: High speed internet over 10 Mbps, the ability to plug in directly to the home internet router. These at-home technical requirements are subject to change with any scheduled re-opening of our office locations.

Evolent Health is an equal opportunity employer and considers all qualified applicants equally without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status, or disability status.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Azure Computer Science CrowdStrike EDR Incident response Linux Malware Monitoring SIEM SOC Splunk Threat intelligence Windows

Perks/benefits: Startup environment Team events

Region: Asia/Pacific
Country: India
Job stats:  15  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.