SOC Analyst
Bengaluru
Applications have closed
Everbridge
Keep people safe and organizations running with Everbridge. Empower Resilience. Anticipate, mitigate, respond to, and recover from critical events.About the Team
As a member of the security operations team, you will strive to take a pragmatic approach when proposing security solutions, implementing security best practices, and performing day-to-day analysis of current security logs and posture to help in maintaining security and threat-related situation awareness.
What You'll Do :
- Operational Duties: Daily review and analysis of data from intrusion detection systems, anti-virus solutions, vulnerability assessment tools, as well as log correlation tools to identify actionable threats or remediation. Responsible for event handling and support of incident response for any known or potential security incidents/events globally. Communicates and coordinates with all internal IS and operations teams as well as any service providers on various attack scenarios including viruses, worms, stolen credentials, DDoS attacks, etc. Conducts investigations while communicating and coordinating remediation efforts. Stays well-informed and current on product updates, the threat landscape, and vulnerabilities relating to technology.
- Business Support: Participates in business and technology initiatives as an information security professional. Assists in defining security-related processes and procedures for the department as well as the company that can be employed on a global basis. Participates in internal and third-party audits of the company’s information security policies, and procedures, as well as operational duties while supporting any remediation efforts that may be identified as a result of an audit.
- Projects: Helps coordinate and execute security projects as defined and prioritized in the overall global security strategy. Evaluates the security posture of the company globally as well as any related data assets to ensure internal security controls are appropriate and operating as intended. Stays well-informed and current on the latest information security technologies, methodologies, and events. Evaluates and deliver feedback on the potential security aspects or impact of non-security related technology including
What You'll Bring:
- Bachelor’s degree (or equivalent experience) in Computer Science, Engineering, or other technical field
- Must have 3-7 yrs of direct information security experience in a global IT environment supporting at least 2 of the 10 security domains.
- Previous experience in a security operations center (SOC) performing protect and defend operations and/or incident response.
- Security certification, such as Certified | Ethical Hacker (C|EH), GIAC Certified Incident Handler (GCIH) a plus
- Detailed functional knowledge of network technologies including network security focused technologies such as next generation firewalls and web application firewalls in a global IT environment
- Working knowledge of server technologies including administration, virtualization and Active Directory
- Working knowledge of both Windows and Linux/Unix operating systems
- Working knowledge of AWS and cloud based global IT environment
- Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
- Monitor external data sources (e.g., computer network defense [CND] vendor sites, Computer Emergency Response Teams, SANS)
- Security Focus to maintain currency of CND threat condition and determine which security issues may have an impact on the enterprise
- Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
- Perform computer network defense (CND) trend analysis and reporting
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
- Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts
- Provide timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities
- Use computer network defense (CND) tools for continual monitoring and analysis of system activity to identify malicious activity
- Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information
- Determine appropriate course of action in response to identified and analyzed anomalous network activity
- Identify and analyze anomalies in network traffic using metadata
- Experience on tools such as Sumo Logic, Sophos, O365 email security would be a plus.
- Experience using Microsoft Word, Excel, PowerPoint, Visio, and SharePoint. Microsoft Project, Access, SQL, PowerShell, or scripting experience is a plus.
Bridger Culture:
At Everbridge, we have a mission that matters – to keep people safe and businesses running during critical events. Our “Bridgers” join Everbridge to make a positive impact on the world through their work. The core of our company culture is built around making a difference. Our people are dedicated to solving problems during difficult times and challenging situations as our software was built to save lives. We are a rapidly growing organization transforming the field of critical event management and need passionate, committed and determined individuals to help us carry out our mission. Our environment is dynamic, and our culture is constantly evolving and expanding in order to provide the best employee experience. Click here to learn more about what we do. Passionate about our mission? Want to #BeTheBridge? Apply to be a part of our team today! Everbridge is an Equal Opportunity/Affirmative Action Employer. All qualified Applicants will receive consideration for employment without regard to race, creed, color, religion, or sex including sexual orientation and gender identity, national origin, disability, protected Veteran Status, or any other characteristic protected by applicable federal, state, or local law.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Active Directory Audits AWS C Cloud CND Computer Science DDoS Firewalls GCIH GIAC Incident response Intrusion detection Linux Monitoring Network security PowerShell SANS Scripting Security strategy SharePoint SOC SQL Strategy UNIX Vulnerabilities Windows
Perks/benefits: Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Product Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Clearance-related jobs
- Open Windows-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open IPS-related jobs