Company Description
Attosol is a specialized cybersecurity firm offering advanced Managed Detection and Response (MDR) services. Through continuous monitoring, real-time threat intelligence, and swift remediation, they protect organizations from evolving cyber threats, ensuring a reliable security posture and compliance across cloud and on-prem environments.
Role Description
This is a full-time on-site role for a Security Operations Center Analyst at Attosol in New Delhi. The Security Operations Center Analyst will be responsible for Incident handling.
Job Title: SOC Analyst (Incident Monitoring)
Role Type: - 24*7
Experience - Minimum 2 years of experience as a SOC Analyst.
Responsibilities:
1. Continuously monitor security events across all company networks and systems.
2. Identify and prioritize potential security incidents using threat intelligence tools.
3. Investigate alerts, gather evidence, and analyze root causes of potential threats.
4. Escalate incidents promptly to the appropriate teams for remediation.
5. Document incidents, actions taken, and outcomes in incident management systems.
6. Collaborate with cross-functional teams to implement preventive measures and improve response strategies.
7. Maintain up-to-date knowledge of emerging threats, vulnerabilities, and adversary tactics.
8. Assist in tuning security tools to minimize false positives and enhance detection accuracy.
9. Support development and refinement of SOC processes and playbooks.
10. Conduct periodic reporting on security incidents and response performance to stakeholders.
11. Comply with relevant policies, regulations, and industry standards.
Required Skillset:
1. Proven experience with Microsoft Sentinel for security event analysis and incident response.
2. Strong understanding of SIEM tools, network security, and intrusion detection/prevention systems.
3. Proficiency in investigating security alerts and conducting root cause analysis.
4. Knowledge of threat intelligence platforms, (IOCs), and MITRE ATT&CK framework.
5. Familiarity with security incident handling methodologies and best practices.
6. Experience with scripting and automation (e.g., PowerShell, Python) for SOC operations.
7. Excellent communication skills to collaborate with cross-functional teams and document findings.
8. Detail-oriented mindset with the ability to prioritize alerts and manage multiple incidents.
9. Analytical and problem-solving abilities to drive continuous security improvement.