We are seeking a skilled and experienced Information Security Analyst/ SOC Administrator to join our team in Tripura. In this critical role, you will be instrumental in safeguarding our Data Centre Infrastructure, ensuring the continuous protection of our digital assets from evolving cyber threats. You will lead our cybersecurity operations, providing expert guidance and fostering a robust security posture. Key Responsibilities: Cybersecurity System Management: Manage, monitor, and analyze cybersecurity systems to proactively protect Data Centre Infrastructure from intrusions. Incident Management & Reporting: Prepare daily, weekly, and monthly analysis reports for DIT, detailing incident severity, root causes, and recommended remedial measures to prevent reoccurrence. Manage CSOC event and information intake, including intelligence gathering, monitoring ticket queues, investigating reported incidents, and liaising with security and network groups. Team Leadership & Mentorship: Monitor the performance of Level 1 and Level 2 analysts by thoroughly investigating incoming events using CSOC tools. Ensure timely resolution of Level 1 and Level 2 events through available reporting and metrics. Approve and, if necessary, further investigate Level 1 and Level 2 escalated events. Mentor and guide Level 1 and Level 2 analysts to enhance their detection capabilities within the CSOC. Expert Analysis & Research: Function as a Subject Matter Expert (SME) in incident detection and analysis techniques, offering guidance to junior analysts and strategic recommendations to organizational managers. Conduct security research and intelligence gathering on emerging threats and exploits. Investigate new vulnerabilities and share the latest industry-level responses and best practices. Risk Management & Consulting: Perform risk assessments and develop mitigation strategies. Provide network and security consulting and training to internal teams. Operational Excellence & Business Continuity: Monitor overall SOC performance. Serve as a backup analyst for potential coverage gaps to ensure seamless business continuity. Stakeholder Engagement: Liaise effectively with various internal and external stakeholders during incident response. Additional Responsibilities: Perform other auxiliary cybersecurity responsibilities as required. Required Skills and Qualifications: Education: B.E / B-Tech / MCA / MSc. IT. Experience: Minimum 2 years of experience in SOC services, specifically conducting security device administration & management. Minimum 2 years of hands-on experience with SIEM tools and other security tools. Certifications (at least one of the following): Certification in at least one industry-leading SIEM product (e.g., Splunk Certified Admin/Architect, IBM QRadar Certified Analyst/Administrator, Arc Sight Certified Analyst/Administrator, Microsoft Azure Sentinel certifications). Certification in ISO 27001:2013 or later version.
Job Title
Information Security Analyst