Job Opportunity - SOC Analyst at Remote, Remote, USA |
Email: [email protected] |
From: Iswarya, Smarttechlink [email protected] Reply to: [email protected] Hi, We do have a priority requirement with one of our clients. Kindly review and let me know if you have any questions. SOC Analyst Location: Remote a. Proficiency in triaging. b. Strong communication skills, as they will need to collaborate with other operational personnel at the customer end and be comfortable raising concerns as needed. c. Analytical thinking abilities, in addition to adhering to playbooks, as certain cases may have variations where standard steps may not apply. Main and commonly use tools are: Palo Alto XSOAR - since this is the CDC-like where we get/handle all of our alerts Palo Alto XDR - Performing search queries to determine if user's device is really compromised or false positive ProofPoint - Big bulk of the incidents came from proofpoint, knowing where to look for information can greatly speed up the triaging process. Microsoft - Useful to gather critical information that could determine if the incident is false positive (e.g. User's connection status) ServiceNow (SNOW) - analysts are required to handle request from users but this platform can be a very useful tool which can close incidents as false positive without the need for further investigations (E.g. Approval had already been given to perform some tasks when user had previously requested it in Servicenow) Thanks & Regards Iswarya Technical Recruiter iswarya.k @smarttechlink.com | www.smarttechlink.com Keywords: information technology Job Opportunity - SOC Analyst [email protected] |
[email protected] View all |
Mon Oct 07 20:09:00 UTC 2024 |