Enable job alerts via email!

Genpact Hiring For Manager – SOC Senior Analyst (SOC L3) at Gurugram

Genpact

Gurugram District

On-site

INR 6,00,000 - 12,00,000

Full time

30+ days ago

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Start fresh or import an existing resume

Job summary

Join a dynamic and innovative firm that is on the forefront of cybersecurity! As a Manager, SOC Senior Analyst, you will play a pivotal role in safeguarding digital environments by supporting threat monitoring, detection, and incident response. This position offers a chance to work in a fast-paced, 24/7 Cyber Defence Centre, where your analytical skills and technical expertise will be crucial in tackling complex security challenges. With a focus on continuous learning and growth, this role invites you to thrive in an environment that values curiosity and courage. If you're ready to make a significant impact in the realm of cybersecurity, this opportunity is for you!

Qualifications

  • Graduation required with a focus on Cybersecurity.
  • Security certifications like GCIH, OSCP, and CEH preferred.

Responsibilities

  • Support incident response and remediation for security alerts.
  • Conduct comprehensive monitoring and identify vulnerabilities.
  • Research emerging threats and develop threat profiles.

Skills

Cybersecurity incident response
Threat monitoring and detection
Forensics
Advanced firewalls
Incident Response tools
SIEM
Data Loss Prevention (DLP)
Cloud environments (AWS, Azure)

Education

Graduation

Tools

EDR
PAM
CASB
Computer forensic analysis tools

Job description

Job Description

With a startup spirit and 115,000+ curious and courageous minds, we have the expertise to go deep with the world’s biggest brands—and we have fun doing it! We dream in digital, dare in reality, and reinvent the ways companies work to make an impact far bigger than just our bottom line. We’re harnessing the power of technology and humanity to create meaningful transformation that moves us forward in our pursuit of a world that works better for people.

Now, we’re calling upon the thinkers and doers, those with a natural curiosity and a hunger to keep learning, keep growing. People who thrive on fearlessly experimenting, seizing opportunities, and pushing boundaries to turn our vision into reality. And as you help us create a better world, we will help you build your own intellectual firepower.

Welcome to the relentless pursuit of better.

Inviting applications for the role of Manager, SOC Senior Analyst (SOC L3)

In this role, you will support threat monitoring, detection, event analysis, incident response/reporting, forensics, and threat hunting activities for its Cyber Defence Centre (SOC), which is a 24/7 environment. The SOC L3 Analyst must be able to rapidly respond to security incidents and should have relevant experience in Cybersecurity incident response and have a deeper understanding with some hands-on experience on enterprise IT infra components such as advanced firewalls, IPS/IDS/WIPS/HIPS, routers/switches, TACACS, VPN, proxy, AV, domain controllers, DNS, DHCP, multi-factor authentication, virtualization, Email systems/security, DLP etc. along with cloud environments (AWS, Azure etc.).

Responsibilities

  1. Providing incident response/investigation and remediation support for escalated security alerts/incidents (should be flexible to work in 24/7 environment)
  2. Leverages emerging threat intelligence (IOCs, updated rules, etc.) to identify affected systems and the scope of the attack
  3. Performing comprehensive computer monitoring, identifying vulnerabilities, Target mapping and profiling.
  4. Provides support for complex computer/network exploitation and defence techniques to include deterring, identifying, and investigating computer and network intrusions
  5. Provides technical support for forensics services to include evidence seizure, computer forensic analysis and data recovery, in support of computer crime investigation. Researches and maintains proficiency in open and closed source computer exploitation tools, attack techniques, procedures, and trends.
  6. Performs research into emerging threat sources and develops threat profiles. Keep updated on the latest cybersecurity threats.
  7. Demonstrates strong evidence of analytical ability and attention to detail. Has a broad understanding of all stages of incident response.
  8. Has a sound understanding of SIEM, PAM, CASB, EDR, other threat detection platforms and Incident Response tools.
  9. Has a systematic, disciplined, and analytical approach to problem-solving
  10. Knowledge of current threat landscape (threat actors, APT, cyber-crime, etc.)
  11. Has basic knowledge of Data Loss Prevention monitoring
  12. Has basic knowledge of audit requirements (PCI, HIPPA, SOX, etc.)

Qualifications we seek in you!

Minimum qualifications

  1. Graduation

Preferred qualifications

  1. Security Certifications Preferred (Including but not limited to the following certifications): Certified Incident Handler (GCIH), GDAT, OSCP, CHFI, CEH.

Genpact is an Equal Opportunity Employer and considers applicants for all positions without regard to race, color, religion or belief, sex, age, national origin, citizenship status, marital status, military/veteran status, genetic information, sexual orientation, gender identity, physical or mental disability or any other characteristic protected by applicable laws. Genpact is committed to creating a dynamic work environment that values diversity and inclusion, respect and integrity, customer focus, and innovation. For more information, visit www.genpact.com. Follow us on Twitter, Facebook, LinkedIn, and YouTube.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.