Monitoring and safeguarding the log sources and security access
Planning for disaster recovery in the event of any security breaches
Monitor for attacks, intrusions and unusual, unauthorized or illegal activity
Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems
Conduct security assessments, risk analysis and root cause analysis of security incidents
Handling incidents escalated by the L1 team in 24x7 rotational shifts
Use advanced analytics tools to determine emerging threat patterns and vulnerabilities
Completing all tactical security operations tasks associated with this engagement.
Analyses all the attacks and come up with remedial attack analysis
Conduct detailed analysis of incidents and create reports and dashboards
Requirements :
Leveraging Technology - Knowledge of current and upcoming technology (automation, tools and systems) to build efficiencies and effectiveness in own function/ Client organization - Expert
Process Excellence - Ability to follow the standards and norms to produce consistent results, provide effective control and reduction of risk - Expert
Functional/Technical - Knowledge of Network Security devices, firewalls, end points, SIEM, application security, IPS/IDS, VA / PT skills - Master