Security Specialist-SIEM Admin
Fort (Mumbai) IT development
Job description
Introduction
As a Service Delivery Specialist, you are the face of IBM for our customers. Your clients' success depends on your ability to understand their needs and respond to requests for new services. This role is an integral part of both account planning and delivering support strategies, working to proactively monitor problems, change processes, and handle issues to ensure our customers success.
Your Role and Responsibilities
The Security Analyst monitors security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity, escalate to managed service support teams, tier2 information security specialists, and/or customer as appropriate to perform further investigation and resolution.
Responsibilities:
· Good knowledge of SIEM, SIEM Architecture, SIEM health check.
· Deployment of SIEM in customer environment.
· Audit the SIEM in the customer environment.
· Troubleshoot issues regarding SIEM and other SOC tools.
· Good verbal/written communication skills.
· Build of use case for the customer.
· Data archiving and backup and data purging configuration as per need and compliance.
· Raising change management tickets for SOC Administration activities like Patch upgrade for SIEM, onboarding log sources etc.
· Helping L2 and L1 with required knowledge base details and basic documentations.
· Co-ordination with L2 and SOC Monitoring team for troubleshooting issues and highlighting them to clients for further resolution and escalation.
· High ethics, ability to protect confidential information.
· Troubleshooting at device and connector/agent end to fix the anomaly reported by other team and observed on day to day basis.
· Building of incident reports, advisories and review if SLA has been met for Incident alerting and Incident closure.
· Update and maintain SOC knowledge base for new security incidents and docs.
· Proven expertise in handling the daily monitoring of Information Security events on the ArcSight/ QRadar console platform
· Creation of daily status report sheet and submit to SOC manager for review.
· Review advisories and make necessary detection measures.
· Provide analysis and trending of security log data from a large number of security devices.
· Troubleshooting non-reporting devices fix and maintain device status.
· Working with OEM (Tool support) in a way to resolve the issue or incident raised.
· Administration of Windows and Unix servers.
· Building Parser for the SIEM using regex.
· Ready to work on 24/7 shifts to support client requirement.
Required Technical and Professional Expertise
· 2 Years of Experience in SOC and min. 1 years on Qradar, Splunk SIEM Engineering
· Exposure to next generation SOC (2.0)
· Escalation point for L2 and Soc Monitor team.
· Ability to drive call and summarizing it post discussion.
· Handsome experience in SIEM administration and Event flow architecture and different types of logs generated by devices like Windows, Proxy, Network Devices, Database…etc.
· Good Understanding of Firewall, IDP/IPS, SIEM functioning (Generalize HLD as well as LLD).
· Deep understanding on Windows, DB, Mail cluster, VM and Linux commands.
· Knowledge of network protocols TCP/IP and ports.
· Team Spirit and working ideas heading to resolution of issues.
Preferred Technical and Professional Expertise
· Qualifications like CISA, CISM, CISSP, CEH, SANS or any other recognized qualification in Cybersecurity (SIEM/Qradar certification) will be preferred.
· Thorough knowledge in SIEM tool and experience in networking, Cloud security experience will be preferred.