Job Description :
- Lead and Manage Security Operations Center (SOC) for organization and its group entities
- Provide strategic directions to SOC team and organization for security posture improvements.
- Foster innovation and drive accountability within SOC engineering and operations.
- Ensure compliance to SLA, process adherence and process improvisation to achieve operational objectives
- Responsible for security event monitoring, management and Incident response
- Responsible for incident identification, assessment, quantification, reporting, communication, mitigation and monitoring
- Act as a point of contact for problem escalation and reporting to Senior Management and Regulatory Authorities.
- Lead and manage security incidents from identification through remediation
- Revise and develop processes to strengthen the current Security Operations Framework, review policies and highlight the challenges in managing SLAs.
- Management, administration & maintenance of security devices
- Perform threat management, threat modeling, identify threat vectors and develop use cases for security monitoring.
- Responsible for integration of standard and non-standard logs in SIEM
- Creation of reports, dashboards, metrics for SOC operations and presentation to Sr. Management
- Ensure effective co-ordination with stakeholders
- Build and maintain positive working relationships with internal as well as external stakeholders
Skills Required :
- Establish operational foundations, defining metrics and KPIs to drive governance, quality, and efficiency.
- Experience in handling / co-ordination with Security Operations Center (SOC)
- Proficient in Incident Management and Response
- Experience in security device management and SIEM
- In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident management etc.
- Experience in threat hunting and threat intelligence
- Sound knowledge on ATT&CK MITRE Framework and Cyber Kill chain.
- Knowledge of various operating system flavors including but not limited to Windows, Linux, Unix
- Knowledge of applications, databases, middleware to address security threats against the same.
Komal Singh
Didn’t find the job appropriate? Report this Job