Search by job, company or skills

Tata Communications

Manager - Captive Operations

new job description bg glownew job description bg glownew job description bg svg
  • Posted 4 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

About The Company

Tata Communications Redefines Connectivity with Innovation and IntelligenceDriving the next level of intelligence powered by Cloud, Mobility, Internet of Things, Collaboration, Security, Media services and Network services, we at Tata Communications are envisaging a New World of Communications

Organisation : Novamesh Ltd (TATA Commununications Ltd)

Position : L3,

Location Jaipur

Shift : 9x5

Qualification: B.E./ B.Tech/ MCA/ M.Sc. in Computer Science

or IT

Job Description: SIEM, SOAR, UEBA, and NBAD Specialist

Position Summary

We are looking for a skilled Security Operations

Specialist
with expertise in SIEM, SOAR, UEBA, and NBAD technologies

to strengthen our security monitoring, automation, and threat detection

capabilities. The ideal candidate should have a strong technical background,

relevant experience in cyber security, and a proactive attitude toward threat

hunting and incident response.

Roles And Responsibilities

Cyber threat collection & Analysis, Global Threat Feed

Tools, SOC Automation, Forensics Artifact handling & Analysis, Incident

Response, Tradecraft Analysis, Security Consulting & Training,

Communicating Emergency Alerts & Warnings to relevant/designated

stakeholders, Perform analysis on the reported incidents, determine the root

cause, recommend the appropriate solution ensure the necessary SOC documents

like operating, procedures, configuration management, Low Level Design, etc.

are up to date with the changes made in their respective areas.

Work on tickets assigned by L1/L2 for further analysis

and ensure timely response and resolution of tickets as per SLA. Maintain MTTR

and MTTD.

Reporting the security events/ incidents to SOC Manager other

relevant/ designated stakeholders. Communicating Emergency Alerts &

Warnings to relevant/designated stakeholders.

Should have knowledge of below technologies

  • Experience in SIEM Tool like ArcSight,

LogRhythm SIEM, Threat Intelligence, Malware Analysis, Incident Response

  • Experience in handling SOC customer in Captive

Environment

  • Team management experience more than 20+

team members, performance measurement experience.

  • Experience in handling P1 incident,

driving investigation till closure

  • Responsible for the technical Administration

or troubleshooting in SIEM ensuring the efficient functionality of the solution

  • Responsible for Incident Validation,

Incident Analysis, Solution Recommendation,

  • Good

knowledge on implementation, installation, integration troubleshooting and

overall functionalities of LogRhythm/ArcSight/QRadar/Splunk

  • Experience

in creating content based on MITRE Framework

  • Exposure to

SOAR, alert aggregation, automation, Playbook creation

  • Monthly/Quaterly

Review with customer

Maintains

awareness of new and emerging cyber-attack threats with potential to harm

company systems and networks. Devises and implements countermeasures to

mitigate potential security threats.

Assists

with the development and maintenance of IT security measurement and reporting

systems to aid in monitoring effectiveness of IT Security programs.

Good Coordination Skills With Various Other

teams for faster resolution/completion.

Good to have threat hunting knowledge.

UEBA (User and Entity Behavior

Analytics)

Monitor behavioral analytics to detect insider

threats, compromised accounts, and anomalous activities.

Configure and tune UEBA models to reduce false

positives and enhance detection capabilities.

NBAD (Network Behavior Anomaly

Detection)

Monitor and analyze network traffic to identify

anomalies indicating potential threats or breaches.

Work with network and SOC teams to investigate

and respond to suspicious network behavior.

Required Qualifications

Education Qualification: B.E./ B.Tech/ MCA/ M.Sc. in Computer Science or IT

  • Experience:
  • Minimum 8+ years of relevant experience in Security Operations, Threat Detection, or Incident Response.
  • Certifications:

Certified Ethical Hacker (CEH) mandatory.

More Info

Job Type:
Industry:
Employment Type:

About Company

Job ID: 137384063