SOC L2 – Incident Response

From 5 to 10 year(s) of experience
₹ Not Disclosed by Recruiter

Job Description

  • Experience in SOC monitoring , Analysis of incidents generated by SIEM alerts
  • Worked on use cases for Splunk, DNIF SIEM Tool.
  • WAF (Web Application Firewall) Zscaler proxy, Bluecoat Proxy, Reverse Proxy.
  • Experience in threat hunting, security incident handling , Malware analysis
  • Experience on EDR tools for Incident response and threat hunting (Symantec EDR, Sentinel
  • One XDR)
  • Experience of email analysis, whitelisting and blacklisting of email IDs on Office 365
  • gateway
  • Experience on IP management on Fortigate and Palo Alto, Firewall
  • Handling of BMC Remedy and Freshworks Ticketing tool.
  • Experience on Fortigate VPN, FortiAuthenticator, Analyser and Bomgar Tool
  • Knowledge on Mcafee DLP and EPO
  • Worked with teams to Install, configure and manage the network security and cyber security softwares.
  • Installation and update of proxy servers and print servers.
  • Installation and configuration of SIEM tools, Endpoint security, Symantec EDR Malware analysis and remediation.
  • Follow-up with incident response team for remediation
  • Monitoring Security alerts generated by SIEM.

Key Skills
Skills highlighted with ‘‘ are preferred keyskills


UG:B.Sc in Computers,B.Tech/B.E. in Any Specialization,BCA in Any Specialization

PG:M.Tech in Any Specialization,MCA in Any Specialization,MS/M.Sc(Science) in Computers

Company Profile

NMS Consultant

Leading Cyber Security Services

Company Info
View Contact Details+

Contact Company:NMS Consultant



Not Disclosed by Recruiter

Role Category:

IT Security


Security Engineer / Analyst

Employment Type:

Full Time, Permanent