Hi All
Please share the updated profile to [email protected]
Role: SOC Analyst – Cyber security
Location: Remote
Exp: 14
JD
a. Proficiency in triaging.
b. Strong communication skills, as they will need to collaborate with other operational
personnel at the customer end and be comfortable raising concerns as needed.
c. Analytical thinking abilities, in addition to adhering to playbooks, as certain cases may have variations where standard steps may not apply. Main and commonly use tools are:
Palo Alto XSOAR – since this is the CDC-like where we get/handle all of our alerts Palo Alto XDR – Performing search queries to determine if user’s device is really compromised or false positive ProofPoint – Big bulk of the incidents came from proofpoint, knowing where to look for information can greatly speed up the triaging process. Microsoft – Useful to gather critical information that could determine if the incident is false positive (e.g. User’s connection status) ServiceNow (SNOW) – analysts are required to handle request from users but this platform can be a very useful tool which can close incidents as false positive without the need for further investigations (E.g. Approval had already been given to perform some tasks when user had previously requested it in Servicenow)
Regards
[email protected]
linkedin.com/in/shravan-kumar-91b72087
|