SOC Analyst
Bengaluru
Full Time Entry-level / Junior USD 49K - 75K *
Everbridge
Assess risk, locate impacted people and assets, act rapidly, and analyze outcomes to drive organizational resiliency and keep people safe.About the Team
As a member of the security operations team, you will strive to take a pragmatic approach when proposing security solutions, implementing security best practices, and performing day-to-day analysis of current security logs and posture to help in maintaining security and threat-related situation awareness.
What You'll Do :
- Operational Duties: Daily review and analysis of data from intrusion detection systems, anti-virus solutions, vulnerability assessment tools, as well as log correlation tools to identify actionable threats or remediation. Responsible for event handling and support of incident response for any known or potential security incidents/events globally. Communicates and coordinates with all internal IS and operations teams as well as any service providers on various attack scenarios including viruses, worms, stolen credentials, DDoS attacks, etc. Conducts investigations while communicating and coordinating remediation efforts. Stays well-informed and current on product updates, the threat landscape, and vulnerabilities relating to technology.
- Business Support: Participates in business and technology initiatives as an information security professional. Assists in defining security-related processes and procedures for the department as well as the company that can be employed on a global basis. Participates in internal and third-party audits of the company’s information security policies, and procedures, as well as operational duties while supporting any remediation efforts that may be identified as a result of an audit.
- Projects: Helps coordinate and execute security projects as defined and prioritized in the overall global security strategy. Evaluates the security posture of the company globally as well as any related data assets to ensure internal security controls are appropriate and operating as intended. Stays well-informed and current on the latest information security technologies, methodologies, and events. Evaluates and deliver feedback on the potential security aspects or impact of non-security related technology including
What You'll Bring:
- Bachelor’s degree (or equivalent experience) in Computer Science, Engineering, or other technical field
- Must have 3-7 yrs of direct information security experience in a global IT environment supporting at least 2 of the 10 security domains.
- Previous experience in a security operations center (SOC) performing protect and defend operations and/or incident response.
- Security certification, such as Certified | Ethical Hacker (C|EH), GIAC Certified Incident Handler (GCIH) a plus
- Detailed functional knowledge of network technologies including network security focused technologies such as next generation firewalls and web application firewalls in a global IT environment
- Working knowledge of server technologies including administration, virtualization and Active Directory
- Working knowledge of both Windows and Linux/Unix operating systems
- Working knowledge of AWS and cloud based global IT environment
- Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
- Monitor external data sources (e.g., computer network defense [CND] vendor sites, Computer Emergency Response Teams, SANS)
- Security Focus to maintain currency of CND threat condition and determine which security issues may have an impact on the enterprise
- Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
- Perform computer network defense (CND) trend analysis and reporting
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
- Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts
- Provide timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities
- Use computer network defense (CND) tools for continual monitoring and analysis of system activity to identify malicious activity
- Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information
- Determine appropriate course of action in response to identified and analyzed anomalous network activity
- Identify and analyze anomalies in network traffic using metadata
- Experience on tools such as Sumo Logic, Sophos, O365 email security would be a plus.
- Experience using Microsoft Word, Excel, PowerPoint, Visio, and SharePoint. Microsoft Project, Access, SQL, PowerShell, or scripting experience is a plus.
Bridger Culture:
At Everbridge, we have a mission that matters – to keep people safe and businesses running during critical events. Our “Bridgers” join Everbridge to make a positive impact on the world through their work. The core of our company culture is built around making a difference. Our people are dedicated to solving problems during difficult times and challenging situations as our software was built to save lives. We are a rapidly growing organization transforming the field of critical event management and need passionate, committed and determined individuals to help us carry out our mission. Our environment is dynamic, and our culture is constantly evolving and expanding in order to provide the best employee experience. Click here to learn more about what we do. Passionate about our mission? Want to #BeTheBridge? Apply to be a part of our team today! Everbridge is an Equal Opportunity/Affirmative Action Employer. All qualified Applicants will receive consideration for employment without regard to race, creed, color, religion, or sex including sexual orientation and gender identity, national origin, disability, protected Veteran Status, or any other characteristic protected by applicable federal, state, or local law.
* Salary range is an estimate based on our salary survey 💰
Tags: Active Directory Audits AWS C Cloud Computer Science DDoS Firewalls GCIH GIAC Incident response Intrusion detection Linux Monitoring Network security PowerShell SANS Scripting Security strategy SharePoint SOC SQL Strategy UNIX Vulnerabilities Windows
Perks/benefits: Team events
More jobs like this
Explore more InfoSec/Cybersecurity career opportunities
Find open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Analysis, Cryptography, Digital Forensics and Cyber Security in general, filtered by job title or popular skill, toolset and products used.
- Open Information Security Specialist jobs
- Open Information Security Officer jobs
- Open Staff Product Security Engineer jobs
- Open Senior Security Operations Engineer jobs
- Open Head of Information Security jobs
- Open Senior SOC Analyst jobs
- Open IT Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Security Consultant jobs
- Open Information System Security Officer (ISSO) jobs
- Open Lead Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Infrastructure Security Engineer jobs
- Open Staff Application Security Engineer jobs
- Open Sr. Security Engineer jobs
- Open Senior Penetration Tester jobs
- Open IT Security Analyst jobs
- Open Senior Cybersecurity Engineer jobs
- Open Senior Information Security Engineer jobs
- Open Senior Infrastructure Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Offensive Security Engineer jobs
- Open Senior Security Analyst jobs
- Open Senior Air Defense/BMD Subject Matter Expert jobs
- Open Cyber Program Manager jobs
- Open GCP-related jobs
- Open Clearance-related jobs
- Open Pentesting-related jobs
- Open Governance-related jobs
- Open Network security-related jobs
- Open Risk assessment-related jobs
- Open SaaS-related jobs
- Open ISO 27001-related jobs
- Open Forensics-related jobs
- Open Java-related jobs
- Open Malware-related jobs
- Open Vulnerability management-related jobs
- Open IDS-related jobs
- Open DevOps-related jobs
- Open Cryptography-related jobs
- Open CISM-related jobs
- Open Threat intelligence-related jobs
- Open Analytics-related jobs
- Open Kubernetes-related jobs
- Open APIs-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open IPS-related jobs
- Open TCP/IP-related jobs
- Open DevSecOps-related jobs