Início Índia Security Operations Center Analyst

Início Índia Security Operations Center Analyst

Security Operations Center Analyst

Full time na a Laimoon Verified Company no India
Publicado em November 9, 2024

Detalhes do emprego

Company DescriptionCastellum Labs is a Next Gen Cyber Security Technology Venture that started in 2018, from Hyderabad, India with global ambitions, to change the cybersecurity service model. The company's vision is to change the cybersecurity value model in the industry. They use SaaS platforms, advanced lab infra in the cloud and a team of specialized experts to deliver long-term value. Castellum Labs' primary focus areas in Cyber Security are application security, network and infra security, cloud security, threat detection and response, and Darkweb monitoring and OSINT.Role DescriptionThese are SOC Analysts / Sr. SOC Analysts (L1 and L2) position. All these positions require candidate to perform 24x7 monitoring of enterprise customers, from SOC Centre in Hyderabad, India. Role requires, eye on the glass monitoring, alert analysis, case management, incident reporting and forensic. Role is expected to operate across three shifts on a rotation basis. L1 is to focus on monitoring and incident detailing. L2 is to focus on incident analysis, data collection and report preparation.Number of Positions - 6Location - Hyderabad Experience Needed - Minimum 1 years .. Maximum 8 yearsCompanies Preferred - People with experience in SOC tech companies (not from service companies)Preference - People from strong networking and system admin background who transitioned into securityCondition - Strong interest in cyber security with demonstrable works/projectsCertifications Needed - NoneRequirementYou should be working in a SOC in L1 and/or L2 position with real hands on workWe are not looking for L1 and L2 people who have done only eye on glass monitoringYour graduation can be in any of the science or engineering subjectsOr else be in industry for one/two year with networking/admin backgroundYou will handleAlert monitoringAlert analysisObservables EstablishmentRaw log fetching and analysisIntelligence correlations Incident reportingDashboard based outlier monitoringIncident life cycle management processSOAR automation development for customersYou should be self initiated and driven to learn cyber securityYou should have worked and explored Linux during last two yearsYou should know github well and should have used some tools from gitYou should have strong concept of cyber security fundamentalsYou should have some basic knowledge on shell & pythonYou should have good enough concepts of different type of cyber attacksDeep understanding of MITRE framework in context of real time monitoringVery thorough understanding of the cyber kill chain and its applications in monitoringIf you have what it takes to become a great cyber security SOC Analyst, please apply.Note -- Not a 9 to 5 role (Needs deep involvement and no time constraints should be there)Needs an intent to get deeper into the cyber security areas across whole cyber spectrumThis is not a penetration testing role, so please do not apply if you wish to pursue VAPT career PRB

Apply safely

To stay safe in your job search, information on common scams and to get free expert advice, we recommend that you visit SAFERjobs, a non-profit, joint industry and law enforcement organization working to combat job scams.

Share this job
See All Security Jobs
Feedback Feedback