Kpmg India Services Llp

Security Operations Center Analyst

Kpmg India Services Llp
Bengaluru/Bangalore
Not disclosed
Work from OfficeWork from Office
Full TimeFull Time
Min. 2 yearsMin. 2 years

Job Description

Consultant

The Security Operations Center (SOC) Analyst is primarily responsible for monitoring and responding to alerts generated by the SIEM. The role requires experience in a SOC environment, incident response process and the ability to analyze threats, risks, and impact. The SOC Analyst will be a member of the Digital Security Group and work under the supervision of the SOC Manager, Digital Security. This is a shift position, on rotation to provide 24x7x365 coverage.

Responsibilities   The Security Operations Center (SOC) Analyst will be responsible for monitoring, analyzing, triaging, and remediating alerts generated by the monitoring tools. Escalating alerts to the SOC Manager, IR and remediation teams as deemed necessary from the analysis. The activity of monitoring includes daily review of the product consoles, analyzing the events, and determining which events are actionable. Responsibilities include but not limited to:

· Conduct real-time, continuous 'eyes-on-glass' monitoring of security events, responses, and reporting.

· Acknowledge tickets in ITSM according to defined service level agreements.

· Perform security event triage and validate potential threats following standard processes and procedures.

· Analyze, contextualize, and monitor security alerts from various advanced security platforms.

· Utilize internal and external data sources to research and enrich event information, determining if an event warrants classification as an "incident."

· Validate IOCs, investigate intrusion attempts, and conduct in-depth analysis and correlation of host-based logs, network traffic, and other data sources.

· Conduct continuous monitoring of event logs, evaluating, analyzing, and correlating triggers based on established Threat Use Cases.

· Diagnose events using identification playbooks to discern false positives or duplicates.

· Execute daily tasks including ticket review, investigate security events effectively, communicate findings, and escalate concerns to senior staff and/or SOC Manager as needed, per the established playbooks and SOPs (Standard Operating Procedures).

· Identify and prioritize incidents based on organizational impact or threat severity.

 

Position is part of a 24x7x365 shift rotation which will require after-hours and weekend work, may also require on-call as needed to support KPMG business needs.

What you bring to the role

· 3-year college degree or higher

· 2+ years of experience in a SOC environment in the areas of: incident detection and response, remediation,

malware analysis, or Incident Response / forensics

· Hands-on experience with Microsoft Sentinel or other SIEM and EDR/XDR technologies, creating and running

queries, and performing analytics, examination of logs and console events.

· Exposure to Microsoft Defender Endpoint, CSPM/CWP, or similar technologies

· Experience in Web Application Firewalls and API security

· Knowledge or experience in cloud security (Azure)

· Good understanding of SANS and MITRE ATT&CK Frameworks.

· Any industry relevant(s) certifications such as CISSP, CISM, SANS, CISA, CompTIA Security+ or CompTIA

CySA+, GIAC is an asset.

· Strong understanding of business processes and ability to manage change/adhere to change management

processes.

· Great communication skills

Nice to Have:

· Knowledge or experience in cloud security (GCP or AWS)

· Experience in malware analysis and reverse engineering

The Security Operations Center (SOC) Analyst is primarily responsible for monitoring and responding to alerts generated by the SIEM. The role requires experience in a SOC environment, incident response process and the ability to analyze threats, risks, and impact. The SOC Analyst will be a member of the Digital Security Group and work under the supervision of the SOC Manager, Digital Security. This is a shift position, on rotation to provide 24x7x365 coverage.

Responsibilities   The Security Operations Center (SOC) Analyst will be responsible for monitoring, analyzing, triaging, and remediating alerts generated by the monitoring tools. Escalating alerts to the SOC Manager, IR and remediation teams as deemed necessary from the analysis. The activity of monitoring includes daily review of the product consoles, analyzing the events, and determining which events are actionable. Responsibilities include but not limited to:

· Conduct real-time, continuous 'eyes-on-glass' monitoring of security events, responses, and reporting.

· Acknowledge tickets in ITSM according to defined service level agreements.

· Perform security event triage and validate potential threats following standard processes and procedures.

· Analyze, contextualize, and monitor security alerts from various advanced security platforms.

· Utilize internal and external data sources to research and enrich event information, determining if an event warrants classification as an "incident."

· Validate IOCs, investigate intrusion attempts, and conduct in-depth analysis and correlation of host-based logs, network traffic, and other data sources.

· Conduct continuous monitoring of event logs, evaluating, analyzing, and correlating triggers based on established Threat Use Cases.

· Diagnose events using identification playbooks to discern false positives or duplicates.

· Execute daily tasks including ticket review, investigate security events effectively, communicate findings, and escalate concerns to senior staff and/or SOC Manager as needed, per the established playbooks and SOPs (Standard Operating Procedures).

· Identify and prioritize incidents based on organizational impact or threat severity.

 

Position is part of a 24x7x365 shift rotation which will require after-hours and weekend work, may also require on-call as needed to support KPMG business needs.

What you bring to the role

· 3-year college degree or higher

· 2+ years of experience in a SOC environment in the areas of: incident detection and response, remediation,

malware analysis, or Incident Response / forensics

· Hands-on experience with Microsoft Sentinel or other SIEM and EDR/XDR technologies, creating and running

queries, and performing analytics, examination of logs and console events.

· Exposure to Microsoft Defender Endpoint, CSPM/CWP, or similar technologies

· Experience in Web Application Firewalls and API security

· Knowledge or experience in cloud security (Azure)

· Good understanding of SANS and MITRE ATT&CK Frameworks.

· Any industry relevant(s) certifications such as CISSP, CISM, SANS, CISA, CompTIA Security+ or CompTIA

CySA+, GIAC is an asset.

· Strong understanding of business processes and ability to manage change/adhere to change management

processes.

· Great communication skills

Nice to Have:

· Knowledge or experience in cloud security (GCP or AWS)

· Experience in malware analysis and reverse engineering

The Security Operations Center (SOC) Analyst is primarily responsible for monitoring and responding to alerts generated by the SIEM. The role requires experience in a SOC environment, incident response process and the ability to analyze threats, risks, and impact. The SOC Analyst will be a member of the Digital Security Group and work under the supervision of the SOC Manager, Digital Security. This is a shift position, on rotation to provide 24x7x365 coverage.

Responsibilities   The Security Operations Center (SOC) Analyst will be responsible for monitoring, analyzing, triaging, and remediating alerts generated by the monitoring tools. Escalating alerts to the SOC Manager, IR and remediation teams as deemed necessary from the analysis. The activity of monitoring includes daily review of the product consoles, analyzing the events, and determining which events are actionable. Responsibilities include but not limited to:

· Conduct real-time, continuous 'eyes-on-glass' monitoring of security events, responses, and reporting.

· Acknowledge tickets in ITSM according to defined service level agreements.

· Perform security event triage and validate potential threats following standard processes and procedures.

· Analyze, contextualize, and monitor security alerts from various advanced security platforms.

· Utilize internal and external data sources to research and enrich event information, determining if an event warrants classification as an "incident."

· Validate IOCs, investigate intrusion attempts, and conduct in-depth analysis and correlation of host-based logs, network traffic, and other data sources.

· Conduct continuous monitoring of event logs, evaluating, analyzing, and correlating triggers based on established Threat Use Cases.

· Diagnose events using identification playbooks to discern false positives or duplicates.

· Execute daily tasks including ticket review, investigate security events effectively, communicate findings, and escalate concerns to senior staff and/or SOC Manager as needed, per the established playbooks and SOPs (Standard Operating Procedures).

· Identify and prioritize incidents based on organizational impact or threat severity.

 

Position is part of a 24x7x365 shift rotation which will require after-hours and weekend work, may also require on-call as needed to support KPMG business needs.

What you bring to the role

· 3-year college degree or higher

· 2+ years of experience in a SOC environment in the areas of: incident detection and response, remediation,

malware analysis, or Incident Response / forensics

· Hands-on experience with Microsoft Sentinel or other SIEM and EDR/XDR technologies, creating and running

queries, and performing analytics, examination of logs and console events.

· Exposure to Microsoft Defender Endpoint, CSPM/CWP, or similar technologies

· Experience in Web Application Firewalls and API security

· Knowledge or experience in cloud security (Azure)

· Good understanding of SANS and MITRE ATT&CK Frameworks.

· Any industry relevant(s) certifications such as CISSP, CISM, SANS, CISA, CompTIA Security+ or CompTIA

CySA+, GIAC is an asset.

· Strong understanding of business processes and ability to manage change/adhere to change management

processes.

· Great communication skills

Nice to Have:

· Knowledge or experience in cloud security (GCP or AWS)

· Experience in malware analysis and reverse engineering

Experience Level

Mid Level

Job role

Work location
Work locationBangalore, Karnataka, India
Department
DepartmentIT & Information Security
Role / Category
Role / CategoryIT Security
Employment type
Employment typeFull Time
Shift
ShiftDay Shift

Job requirements

Experience
ExperienceMin. 2 years

About company

Name
NameKpmg India Services Llp
Job posted by Kpmg India Services Llp

Similar jobs you can apply for

Technician
Rockstack Technologies Private Limited

Network Technician

Rockstack Technologies Private Limited
Hal, Bengaluru/Bangalore
₹15,000 - ₹18,000
Work from Office
Full Time
Min. 6 months
Basic English
Airtel

Field Installation Engineer

Airtel
Marathahalli, Bengaluru/Bangalore
₹17,000 - ₹23,000
Field Job
Full Time
Any experience
Basic English
Airtel

Field Installation Engineer

Airtel
BTM Layout, Bengaluru/Bangalore
₹17,000 - ₹23,000
Field Job
Full Time
Any experience
No English Required
Santa Events And Exhibitions Pvt. Ltd.

Splicer

Santa Events And Exhibitions Pvt. Ltd.
Sahakara Nagar, Bengaluru/Bangalore
₹26,000 - ₹30,000
Field Job
Full Time
Min. 2 years
Basic English
Prerana Agency

Telecalling Executive

Prerana Agency
Sahakara Nagar, Bengaluru/Bangalore
₹15,000 - ₹20,000
Work from Office
Full Time
Min. 1 year
Basic English
Ace Carbo Nitriders

Maintenance Engineer

Ace Carbo Nitriders
Peenya, Bengaluru/Bangalore
₹30,000 - ₹40,000
Work from Office
Full Time
Any experience
Basic English

You can expect a minimum salary of 0 INR. The salary offered will depend on your skills, experience and performance in the interview.

The candidate should have completed the required education and people who have 2 to 31 years are eligible to apply for this job. You can apply for more jobs in Bengaluru/Bangalore to get hired quickly.

The candidate should have sound communication skills and sound communication skills for this job.

Both Male and Female candidates can apply for this job.

No, it's not a work from home job and can't be done online. You can explore and apply for other work from home jobs in Bengaluru/Bangalore at apna.

No work-related deposit needs to be made during your employment with the company.

Go to the apna app and apply for this job. Click on the apply button and call HR directly to schedule your interview.

The last date to apply for this job is . For more details, download apna app and find Full Time jobs in Bengaluru/Bangalore . Through apna, you can find jobs in 64 cities across India. Join NOW!