Role: SOC Analyst
Job Type: Permanent
Location: Onsite – Letterkenny, Donegal
Ready to utilise your skills in Cyber Security and grow your career with a global IT player?
Are you passionate about staying abreast of the latest cybersecurity threats and vulnerabilities?
We have an exciting opportunity for you as an SOC Analyst!
The Role
As a TCS SOC Analyst, you will be a member of a Security Operation Center (SOC) team, where you will monitor the organisation's IT infrastructure. This includes monitoring security systems, applications, and networks for any irregularities that may indicate a breach or attack. When a potential threat is identified, you will work with the SOC team and other relevant teams (network, VM etc.) to determine what caused the issue within the system and how to prevent it from happening again.
Key Responsibilities:
Understand information security and computer systems concepts, being ready to work in 24*7 shifts. Level-1 SOC security analysts, escalate and support information security investigations for Level-2 SOC analysts who will provide guidance and oversight on incident resolution and containment techniques. Monitor security consoles from various SOC entry channels (Splunk SIEM, Tickets, Email and Phone), identify threats and escalate to Level-2 SOC security analysts. Support information security investigation and receive guidance and oversight on incident resolution and containment techniques. Active involvement in learning about risk management, information security controls, incident analysis, incident response, SIEM monitoring, and other operational tasks in support of technologies managed by the Security Operations Center. Document incidents from initial detection through final resolution. Participate in security incident management and vulnerability management processes. Coordinate with IT teams on escalations, tracking, performance issues, and outages. Work as part of a team to ensure that corporate data and technology platform components are safeguarded from known threats. Communicate effectively with customers, teammates, and management. Provide recommendations in tuning and optimization of security systems, SOC security processes, procedures, and policies. Support the definition, creation, and maintenance of SIEM correlation rules, customer build documents, security processes and procedures. Follow ITIL practices regarding incidents, problems, and change management. Key Skills/Knowledge/Experience:
Bachelor's Degree / Diploma or equivalent experience in a relevant area of study with a preference for Information Security, Computer Science or Computer Engineering. Excellent English written and verbal skills. Knowledge of digital investigations including computer forensics, network forensics, malware analysis and memory analysis. Ability to analyse data, such as logs or packet captures, from various sources within the enterprise and draw conclusions regarding past and future security incidents. Knowledge of IT including multiple operating systems and system administration skills (Windows, Solaris, Unix). Understanding of security incident management, malware management and vulnerability management processes. Good to Have:
Security monitoring experience desirable with one or more SIEM technologies – Splunk (preferable), IBM QRadar, LogRhythm. CompTIA Security+ Certificate. EC-Council's Certified SOC Analyst. Certified Ethical Hacker (CEH). GIAC Security Essentials Certification (GSEC). Rewards & Benefits
TCS is consistently voted a Top Employer in the UK and globally. Our competitive salary packages feature paid holiday entitlement, pension contribution, private healthcare including dental & optical coverage, life assurance and income protection, laptop and phone, cycle-to-work scheme, and exclusive discounts on gym memberships.
Diversity, Inclusion & Wellbeing
At TCS, we believe in building and sustaining a culture of equity and belonging where everyone can thrive. Our diversity motto is 'Inclusion without Exception'.
Join us and do more of what matters. Apply online now.
#J-18808-Ljbffr