● Hands-on role and involves working with SIEM/SOAR technologies
● Analyse security events to help triage and identify security incidents.
● Respond to security incidents, within SLA, following the incident response process to resolve information security incidents using security devices, processes and policies.
● Understanding of frameworks such as MITRE ATTACK.
● Digging on multiple devices and collaborating with different teams across organisation to facilitate improved security posture.
● Perform other tasks as directed by management from time to time.
● Investigate potential security threats and articulate implications on IT systems.
● Support evidence collection requirements to ensure data gathered and reported is accurate.
● Analysing the email gateway logs to find and block the malicious, phishing emails coming towards our environment.
● Publishing the trend reports for various security devices and incidents on weekly, monthly and yearly basis
● Providing day-to-day support to Incident monitoring within SLA Compliance
● Analysing event flow of various devices using rules, reports and dashboards
● Worked on Tanium, which provides Endpoint security for Accenture, deploy Malware Bytes for the infected workstations across the globe and remediate the SEP alerts based on the logs
● Analysing logs to mitigate any possible attacks
● Experience in Email Security Management using Proofpoint (E-mail security gateway)
● Deploying knowledge of network and server infrastructure
● Experience in Web Security Management using web sense (web filtering gateway)
● RCA for different alerts like Privilege escalation, Virus Alert, Proxy Av Alert, firewall port scan, SQL injection etc.
● Having knowledge on Cloud technologies, like AWS and Azure security incidents.
CERTIFICATIONS ●CompTIA Security 501 ●CEH V110 ●Splunk fundamentals
undefined