Job Requirements
- The job requirements include but are not limited to the following tasks.
- Continuously monitor SIEM Console, ServiceNow incident queues and SecOps dashboards for alerts, tickets, and issues.
- Notify system owners and Escalate security incidents per the incident response escalation procedures.
- SIEM Alert tuning and configuration.
- Monitor devices system performance, system resources utilization (disk space, indexed data) and health monitoring.
- Add, configure new log, and event sources into SecOp's tools.
- Fine tuning and policy enhancement for SIEM and other SecOp's tools.
- Responsible for troubleshooting SIEM and SOC (Security Operations Center) operational related issues.
- Assist in case of major outbreak or any critical incident related issue.
- The Incident response team will perform a deep dive incidents analysis by correlating data from various sources.
- Respond to all reported security incidents.
- Follow up with teams for incident closure.
- Maintain incident records as per the guidelines.
- Capture and protect the evidence related to an incident.
- Review and interpret new IoC threats for applicability.
- Deep-dive investigations including traffic \& malware analysis.
- Perform incident damage assessment.
- Update stakeholders about security incidents progress.
- Strong interpersonal communication skills.
- Good verbal and written communication skills.
- Ability to analyze problems and create solutions to Maintain confidentiality of information.
- Must be able to prioritize projects, maintaining a sense of urgency to meet deadlines.
- Must possess the ability to follow verbal and written directions.
- Must be a self-starter and able to work well in independently and in Team.
- Must be able to use critical thinking skills and judgment.
- Must be able to work positively and professionally with a wide range of personalities.
- Must be able to accept constructive criticism.
Working Schedule
Experience
- Ideal candidates will have background / experience in security operations. To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.
- The ideal candidate should be able to work autonomously and be self-motivated.
- The ideal candidate will have experience using / performing searches and tuning a SIEM product.
- The ideal candidate will have experience with the Microsoft suite of security tools.
- The ideal candidate will have experience in using security incident response frameworks \& Mitre framework.
- The requirements listed above are representative of the knowledge, skill and/or ability required.
- Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
We encourage people from underrepresented groups to apply. Come Advance with us! In keeping with our values, no employee or applicant will face discrimination/harassment based on: race, color, ancestry, national origin, religion, age, gender, marital domestic partner status, sexual orientation, gender identity, disability status, or veteran status. Above and beyond discrimination/harassment based on "protected categories," Extreme Networks also strives to prevent other, subtler forms of inappropriate behavior (e.g., stereotyping) from ever gaining a foothold in our organization. Whether blatant or hidden, barriers to success have no place at Extreme Networks.