Cyderes

Security Analyst II – Sentinel, Google Chronicle

Cyderes

full-time

Posted on:

Origin:  • 🇮🇳 India

Visit company website
AI Apply
Apply

Job Level

Mid-LevelSenior

Tech Stack

CloudCyber SecuritySplunk

About the role

  • Cyderes is a global full life-cycle cybersecurity services provider offering managed security, identity and access management, and professional services.
  • Perform initial triage and advanced analysis tasks across endpoint, SIEM, server, and network infrastructure.
  • Perform proactive security investigations and searches on client environment to detect malicious activities.
  • Perform Incident investigations and deep dive analysis on detected threats.
  • Understand and identify indicators of attack and compromise in alerts, by hunting through data, and by reviewing past investigations.
  • Have full understanding of the MITRE ATT&CK framework; map clients’ use cases to tactics and techniques.
  • Triage, review, and provide log data for more insight and recommendations to escalate through SIEM.
  • Maintain up to date knowledge and understanding of the current threat landscape.

Requirements

  • 3 to 5 years of progressing/in-depth IT security experience.
  • Demonstrate experience in using any two Endpoint Detection and Response software like Sentinel one, CrowdStrike, Defender, Carbon black etc
  • Advanced knowledge of at least one leading SIEM platform like Sentinel or Google Chronicle AND Splunk, Elastic, IBM Qradar, Sumo Logic etc
  • Experience in SOC and Incident Response activities.
  • Understanding SIEM correlation, use cases and events.
  • Should hold at least one industry certification Sec+, CEH, SC 200, Any Cloud Certification and Cloud Security Fundamentals is highly preferred
  • Basic scripting or development experience would be an added advantage.
  • Good communication skills