SOC Analyst
f5
Date: 1 week ago
City: Hyderabad
Contract type: Full time
At F5, we strive to bring a better digital world to life. Our teams empower organizations across the globe to create, secure, and run applications that enhance how we experience our evolving digital world. We are passionate about cybersecurity, from protecting consumers from fraud to enabling companies to focus on innovation
Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive About the F5 and Global Cyber Defense Intelligence Team F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to optimize and secure every app and API anywhere, including on-premises, in the cloud, or at the edge. F5 Global Cyber Defense Intelligence Team (GCDI), is part of F5 CISO function implements security countermeasures, manages enterprise-wide cyber incident response and conduct digital forensic, e-Discovery investigation and providing 24/7 security monitoring to ensure security of F5. The team is looking for highly skilled and talented Security SOC Analyst II, who can help us to support, transform, drive and scale critical Cyber Defense program with in F5 Position Summary: As a Security Analyst you will work closely with a team of Security Engineers, Incident response manager and Cyber threat intelligence team to detect and prevent cyber-attacks across F5. The Analyst will have a strong passion for cyber security and its best standards. Candidate should have strong analytical and decision making, process improvement strategies, mentorship qualities, and organization wide collaboration. Highly organized, super curious, and thrive in an environment where priorities shift fast. This is a security detection/respond team operate on 24/7 Primary Responsibilities:
Everything we do centers around people. That means we obsess over how to make the lives of our customers, and their customers, better. And it means we prioritize a diverse F5 community where each individual can thrive About the F5 and Global Cyber Defense Intelligence Team F5 is a multi-cloud application services and security company committed to bringing a better digital world to life. F5 partners with the world’s largest, most advanced organizations to optimize and secure every app and API anywhere, including on-premises, in the cloud, or at the edge. F5 Global Cyber Defense Intelligence Team (GCDI), is part of F5 CISO function implements security countermeasures, manages enterprise-wide cyber incident response and conduct digital forensic, e-Discovery investigation and providing 24/7 security monitoring to ensure security of F5. The team is looking for highly skilled and talented Security SOC Analyst II, who can help us to support, transform, drive and scale critical Cyber Defense program with in F5 Position Summary: As a Security Analyst you will work closely with a team of Security Engineers, Incident response manager and Cyber threat intelligence team to detect and prevent cyber-attacks across F5. The Analyst will have a strong passion for cyber security and its best standards. Candidate should have strong analytical and decision making, process improvement strategies, mentorship qualities, and organization wide collaboration. Highly organized, super curious, and thrive in an environment where priorities shift fast. This is a security detection/respond team operate on 24/7 Primary Responsibilities:
- Responsible for upholding F5’s business code of ethics and promptly reporting violations of the code or other company policies
- Follow F5’s enterprise information security policies and protect, detect, and remediate information assets from unauthorized access, disclosure, modification, destruction, or interference
- Ability to triage and handle security alerts from SIEM and other security monitoring solutions
- Perform investigations leveraging security platforms such as SIEM, EDR, DLP, Email threats detection solutions and cloud platforms such as Azure, AWS and GCP
- Coordinate and support incident response activities, external attack investigations, Insider threat investigations and digital forensic investigations
- Ability to perform threat hunting for known and unknown threats in F5 environments based on available threat intelligence reports and knowledge of the attackers TTPs
- Ability to apply analytical and technical skills to investigate cyber intrusions, detect malicious activity and potential insider threats, and perform incident response
- Correlate events from multiple log sources to detect and disrupt threat actor by detecting unknown threats
- Ability to work with SOC manager and support in drafting incident analysis report
- Provide timely investigation updates to SOC manager
- Ability to prepare process driven playbook/runbook for cyber threat investigations
- Ability to automate cyber response tasks to ensure seamless security operations
- Propose risk mitigating strategies to SOC manager, advise on acceptable mitigating controls and ensure they are documented
- Strong knowledge on cyber investigations, eDiscovery and digital forensics, malware analysis, Network attacks, phishing attacks, cloud attacks, DLP and Web application attacks
- Over 4+ years of cybersecurity experience within a security operations environment
- Prior experience in working in a large-scale security operation centre preferably in technology industry
- Experience in handling daily operations of the SOC security team, including alert triage, incident response, investigations, and threat management
- Experience with 24/7 security operations centres or cyber-Defense centre
- Bachelor’s degree in information systems, MIS or related technical degree and 4+ years of experience in Cyber Security Incident Response /Threat Hunting/Digital Forensics
- Comfortable taking Lead role during security events and incidents
- Hands on experience with managing SIEM, SOAR, M365, AAD, Email security, EDR, Cloud SIEM, DLP, CSPM, IAM, PIM, CTI platforms and Net gen Firewalls etc.,
- Strong understanding on operating systems: Windows, Linux and/or Mac at a filesystem level and familiarity with MITRE ATT&CK framework
- Detecting anomalous system activities, Lateral movements, living-off-the-land, persistence establishment mechanisms and potential intrusions
- Highly motivated, independently driven with good interpersonal skills, both written and verbal; mindfulness and phenomenal organizational and time management skills
- Ability to research and characterize security threats including crafting right countermeasures
- Demonstrated record of finding and pursuing strategic and complex areas of security research in collaboration with internal and external partners at all levels, to include defining right policies, practices, and countermeasures
- Good to have SANS GCIH, GCIA, SANS GCFA, SANS GCFE, CEH, Blue team certifications or other industry-relevant cyber-security certifications are a plus
- Certified experience related to Incident Response, Threat Hunting, Cloud security or Digital Forensics
- Bachelor’s degree in computer science or information systems, MIS or related technical degree with 4+ years of experience in Cyber Security Operations/ Incident Response /Threat Hunting/Digital Forensics
- Ability to inspire change through effective leadership, communication, planning, and execution
- Capable of translating broad targets and aims into a detailed list, setting priorities for yourself and others, and achieving goals
- Knowledge and ability to delivery organizations to key performance indicators
- Able to clearly communicate sophisticated technical issues to larger audience at varying levels
- Ability to work in a highly collaborative team environment
- Able to read, write, and speak English fluently, including complex technical concepts
- Solid skills in MS Visio, Lucid chart, MS Office apps and with standard professional applications
How to apply
To apply for this job you need to authorize on our website. If you don't have an account yet, please register.
Post a resumeSimilar jobs
QA Engineer
Novature Tech,
Hyderabad
1 week ago
Keywords:
Playwright, Javascript, typescript
Experience:
3 - 5 years
Designation / Role:
QA Engineer
Location:
Hyderabad
Job Description:
Job Summary: We are seeking a talented and detail-oriented QA Automation Engineer with expertise in Playwright, JavaScript, and TypeScript. The ideal candidate will have a passion for test automation, experience in developing and maintaining test scripts, and the skills to ensure that...
Services Team Lead
Unisys,
Hyderabad
1 week ago
What success looks like in this role:
Technical lead with .NET full stack experience
Mandatory:
Experience as a Technical lead managing team of developers to design, develop, test, and implement software solutions that meet business and technical requirements.
Write high-quality code that is scalable, maintainable, efficient, and secure.
Coach and mentor engineers in the development process, providing guidance and technical...
Salesperson
Linkwell Telesystems Private Limited,
Hyderabad
3 weeks ago
Skills:Python (Programming Language), pyth, Hardware Diagnostics,We are looking for a friendly salesperson to assist customers in our store. The salesperson is responsible for greeting customers, helping them find items in the store, and ringing up purchases.To be successful as a salesperson you must have excellent communication skills. A good salesperson meets sales objectives while remaining polite and helpful to customers.Greet...