GDC IN BDS Associate Consultant – SOC – Cyber Security

GDC IN BDS Associate Consultant – SOC – Cyber Security


Experience: 3 – 6 Years

Location: Hyderabad

Job Description:

What are we looking for
We are looking for a highly motivated, dedicated and structured teammate, who could join our Automation team, located in Bangalore.
Atos Cyber Security is one of the fastest growing areas of Atos with significant growth plans through additional recruitment and acquisitions. The role requires working within a 8×5 SOC operational support environment incorporating a tiered Security support model across a range of Security support functions in Qatar.
Your primary objective will be too proactively monitor and hunt through customer environments to detect and respond to information security threats. You will help to protect an organization by employing a range of technologies and processes to prevent, detect and manage cyber threats. This can include protection of computers, data, networks and applications.
The Security Operations Analyst Level 3 role is tasked with evaluating SIEM (Security Incident Event Manager) related events flagged for review by established strategies. This evaluation is performed with various validation tools, understanding and application of computer security topics and malware infections, and identification of new techniques to make quick decisions with a high rate of accuracy. The person in this role will contribute to the strategic development of a new pilot program aimed at further enhancing the world-class experience. The Security Operations Analyst Level 3 is expected to adhere to numerous Key Performance Indicators to ensure decisions are made balancing factors such as risk tolerance and customer experience.
Another responsibility of this role is to help train machine learning models by labeling transactions, queries, or other entity pairings.

Required Candidate profile

Profile Requirements
Proposition of specific recommendations
Investigate and solves security breaches and other cyber security incidents and provide incident response.
Incident analysis for correlation rules design and implementation
Business use-cases design and deployment
Check of applied recommendation for L3 incidents
Validates weekly, monthly, quarterly, half and yearly reports
Definition and follow up of incident reconstruction plans
Malware analysis, reverse engineering
Deals with incidents from L2 and investigation and qualification of L2 incidents
Access to tiers tools for investigation
Development, fine-tuning, and implementation of threat detection analytics
Provides investigation on complex incidents
Provides forensics investigation and analysis ( memory, filesystem, network, mobile iOS/Android forensics,
Analyze and provides threat intelligence information
Provides advisories on incident modelling and reconstruction
Define new correlation rules in the SIEM depens on the requirements
Provides security crisis management
Very good communication skills with fluent English
Deep log analysis skills on SIEM – Logrhythm, Logrhythm experience and knowhow will be plus.
Very good knowledge of Windows and/or Linux/Unix,
Very good understanding of security incidents, networking and common protocols,
Scripting in Python, Bash, Perl, PowerShell.
Review standard security arrangements – that is, provide external/semi-external reviews
Manage audits and training for new threats
Stay current on IT security trends and news.
Analyze for attacks, intrusions and unusual, unauthorized or illegal activity
Investigate new vulnerabilities and share the latest industry-level responses
Investigate security breaches and other cyber security incidents and provide incident response.
Liaise with different internal and external stakeholders when an incident occurs
Manage remotely‑stored critical information (passwords, network configs, etc.) in an emergency
Use advanced analytic tools to determine emerging threat patterns and vulnerabilities
liaise with stakeholders in relation to cyber security issues and provide future recommendations
Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
Document security breaches and assess the damage they cause.
Work with security team to perform tests and uncover network vulnerabilities.
Fix detected vulnerabilities to maintain a high-security standard.
Stay current on IT security trends and news.
Research security enhancements and make recommendations to management.
Min 3 years of SOC Level 2 and Min 2 years of SOC Level 3 experience.


Malware AnalysisCrisis ManagementLog AnalysisBig DataInformation SecurityBashMachine LearningSecurity OperationsPythonAndroid

Contact Details:

Recruiter Name:HR
Reference Id:148915


Follow me on social media: