⚠️ TrueCV operates only via TrueCV.com. Please beware of fake or unauthorized websites.

SIEM Qradar

Login for job apply.

Capgemini

  • Salary: Not disclosed
  • Location: Hybrid - Hyderabad, Bangalore Rural, Bengaluru
  • Key Skills: Accounting

Job Description:

Job description The SOC L1 Analyst is responsible for the first line of defense in the Security Operations Center (SOC). This role involves monitoring, analyzing, and responding to security events and incidents using IBM QRadar. The L1 Analyst will work closely with other SOC team members to identify potential security threats and ensure the security of the organization's information systems. Key Responsibilities: Monitoring and Analysis: Monitor security alerts and events using IBM QRadar. Analyze security incidents and determine their impact and urgency. Escalate incidents to L2/L3 analysts as necessary. Incident Response: Respond to security incidents promptly and accurately. Follow incident response procedures and document actions taken. Assist in the containment and mitigation of security threats. Threat Intelligence: Utilize threat intelligence sources to identify new and emerging threats. Correlate security events with threat intelligence to enhance detection capabilities. Reporting and Documentation: Maintain accurate and detailed records of security incidents and actions taken. Generate daily, weekly, and monthly reports on security events and incidents. Collaboration and Communication: Collaborate with other SOC team members to share knowledge and improve detection and response processes. Communicate effectively with other IT and security teams to coordinate responses to security incidents. Continuous Improvement: Participate in SOC training sessions and stay updated on the latest security trends and technologies. Provide feedback to improve SOC processes and QRadar configurations. Qualifications: Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Experience: 2-3 years of experience in a SOC or similar environment. Certifications: Relevant certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), IBM QRadar Certification are preferred. Skills: Technical Skills: Proficiency with IBM QRadar and its components. Understanding of network protocols, intrusion detection systems, and firewall technologies. Basic knowledge of malware analysis and threat intelligence. Familiarity with incident response procedures and best practices. Analytical Skills: Strong analytical and problem-solving skills. Ability to analyze security alerts and determine their severity and impact. Communication Skills: Excellent verbal and written communication skills. Ability to document incidents and communicate effectively with team members and other departments. Soft Skills: Attention to detail and a proactive approach to security monitoring. Ability to work in a fast-paced environment and handle multiple tasks simultaneously. Strong teamwork and collaboration skills. Role: Cyber Security Industry Type: IT Services & Consulting Department: IT & Information Security Employment Type: Full Time, Permanent Role Category: IT Security Education UG: Any Graduate Key Skills Skills highlighted with ‘‘ are preferred keyskills SOCSIEMQradar Security Information And Event ManagementSiem Qradar