SOC Analyst

  • Company:
    Cvent India Pvt Ltd
  • Location:
  • Salary:
    negotiable / month
  • Job type:
    Full-Time
  • Posted:
    7 days ago
  • Category:
    Software Services | Internet/Dot com/ISP

Skill: forensic , web application security , log analysis , IT security , application security , ids , unix / linux , snort , ceh , security analyst , siem , nessus , security , linux , c , os , mobile , information security , windows , data loss prevention; Exp: 0-3 years; SOC Analyst Ind – Gurgaon, HR Cvent, Inc. () is the worlds leading provider of cloud-based software for meetings and event management. Our platform of products includes software to manage and facilitate online event registration, meeting site selection, event management, e-mail marketing and web surveys. We also develop mobile apps for both corporate and consumer events. Founded in 1999, we currently have 3300 talented and dedicated employees and are headquartered just outside of Washington, D.C., in McLean, Virginia, with additional U.S. offices in Portland, Oregon; Austin, Texas, and Los Angeles, California. Internationally we have offices in New Delhi, India, and London, England. Cvent has received a number of awards and honors recognizing our strong company culture, innovative products, stellar customer service and support, visionary leadership and investment in our employees. We currently have job openings across all departments and locations and are looking to add valuable team members to further strengthen the companys DNA. As a SOC Security Analyst you will be responsible for conducting incident response operations according to documented procedures and industry best practices. Candidates in this role must have excellent communication skills; able to interact with executive levels throughout the company. Must have extensive experience in multiple security areas such as SIEM, IDS, APT, and WAF. Candidates will be required to participate in multiple intelligence communities and be able to disseminate pertinent information throughout the SOC. Ideal candidates should have extensive experience in Linux and Windows operating systems, deep knowledge of networking and attack methods such as SQLi and pivoting. Enthusiasm and interest in Information Security must be displayed. Perform monitoring and data correlation to events of interest using multiple tools such as system event logs, SIEM, IPS/IDS logs, network traffic, anti-virus console and client end-point software to determine if there is an incident Respond to security incident and investigation requests in line with established SIRT processes and procedures within defined service level targets Drive containment strategy during data loss or breach events Triage and resolve advanced vector attacks such as botnets and advanced persistent threats (APTs) Perform basic forensic activities e.g. conducting examinations of computers, system logs, applications and networks to locate evidence Perform Root cause analysis (RCA) for the incidents and update the knowledge management Works directly with data asset owners and business response plan owners during high severity incidents Tuning of IDS, proxy policy, in-line malware tools based on threat feeds, trust and reputation data, incidents, or vulnerabilities and exploits of downstream systems Provide tuning recommendations to administrators based on findings during investigations or threat information reviews Technical & Professional Skill Requirements Hands-on investigation and log analysis exposure Experience in IT security and defensive technologies (Antivirus, Firewalls, Event Monitoring, Network and Perimeter devices, Data Loss Prevention, IDS, Web content filtering) Should be familiar with handling and mitigating attacks related to viruses, spoofing, hoaxes, malware Should be familiar with emerging security threats and their attack vectors especially web application attacks Knowledge of SSL/TLS, certificates and encryption methods Exposure to security tools (Web application firewalls, web application security scanning with Burp Suite or Paros, Nessus and Tenable Security Center, Snort IDS, Wireshark, Data Loss Prevention software, NitroView/McAfee ESM) Excellent verbal and written English communication skills are most important for the role. Good documentation, analysis skills with excellent problem solving and planning skills with a flexible approach Sound understanding of OS (Unix/Linux, Windows, OSX), IPS/IDS, VPN, Firewalls, Web Application Firewalls, Application Security. Accredited Certification on Incident Handling (CEH, GCIH, ECIH) Educational qualifications B.E, B. Tech, BCA, MCA Skills & Requirements Qualifications

System Security

Degree: MCA/ PGDCA

Experience: 0-3

Function: IT Software : Software Products & Services