Search by job, company or skills

Tata Communications

Assistant Manager-Captive Operations - Captive Operations

new job description bg glownew job description bg glownew job description bg svg
  • Posted 5 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

About The Company

Tata Communications Redefines Connectivity with Innovation and IntelligenceDriving the next level of intelligence powered by Cloud, Mobility, Internet of Things, Collaboration, Security, Media services and Network services, we at Tata Communications are envisaging a New World of Communications

Job Description SOC Lead-L3

Role: SOC Monitoring

Location: Jaipur

Qualification: B.E./ B.Tech/ MCA/ M.Sc. in Computer Science or IT

Experience : - 5+ years of relevant experience

Certification: CEH

Key Responsibilities

  • Experience in SIEM Tool like ArcSight,

LogRhythm SIEM, Threat Intelligence, Malware Analysis, Incident Response

  • Experience in handling SOC customer in Captive

Environment

  • Experience in handling P1 incident,

driving investigation till closure

  • Responsible for the technical Administration

or troubleshooting in SIEM ensuring the efficient functionality of the solution

  • Responsible for Incident Validation,

Incident Analysis, Solution Recommendation,

  • Good

knowledge on implementation, installation, integration troubleshooting and

overall functionalities of LogRhythm/ArcSight/QRadar/Splunk

  • Experience

in creating content based on MITRE Framework

  • Exposure to

SOAR, alert aggregation, automation, Playbook creation

  • Monthly/Quaterly

Review with customer

Maintains

awareness of new and emerging cyber-attack threats with potential to harm

company systems and networks. Devises and implements countermeasures to

mitigate potential security threats.

Assists

with the development and maintenance of IT security measurement and reporting

systems to aid in monitoring effectiveness of IT Security programs.

Good Coordination Skills With Various Other

teams for faster resolution/completion.

Good to have threat hunting knowledge.

Skills & Competencies

B.E./ B.Tech/ MCA/ M.Sc. in Computer Science or

IT minimum 5-7 years of

Experience

Work

experience of minimum 5 years in SOC Incident Handling, Incident Response Trend

Analysis, administration/monitoring of SIEM Tool like ArcSight, LogRhythm SIEM,

Threat Intelligence, Malware Analysis,

Ability

to adapt and follow the processes and guidelines

Possess

an impeccable work ethic and a high degree of integrity

Good

Analytical & Problem Solving skills

Able

to communicate with technical staff/management

Flexible

to work in Shift

Highly

motivated & customer centric

More Info

Job Type:
Industry:
Function:
Employment Type:

About Company

Job ID: 137383809