Chronicle Security Consultant
Company:
Deloitte
Location:
Mumbai, Maharashtra, India
Experience: 4 to 7 years
Responsibilities:
- Monitor and analyze security events and incidents in real-time using QRadar SIEM.
- Investigate and respond to security incidents escalated by L1 analysts or detected by QRadar.
- Perform log analysis and correlation to identify potential security threats and vulnerabilities.
- Develop and implement SIEM use cases, rules, and alerts to improve the detection and response capabilities.
- Collaborate with the security operations team to develop and execute incident response plans.
- Conduct incident investigations, including containment, eradication, and recovery activities.
- Assist in vulnerability management activities, including scanning, assessment, and remediation.
- Stay up-to-date with the latest threat intelligence, security technologies, and industry best practices.
- Provide guidance and support to L1 analysts in handling security events and incidents.
- Generate reports and metrics on security events, incidents, and SIEM performance.
- Building of incident reports, advisories and review if SLA has been met for Incident alerting and Incident closure.
- Update and maintain SOC knowledge base for new security incidents and docs.
- Review advisories and make necessary detection measures.
Requirements:
- Proven experience working with SIEM / Sentinel / Chronicle, QRadar SIEM and other security tools.
- Ability to drive call and summarizing it post discussion.
- Deep understanding on Windows, DB, Mail cluster, VM and Linux commands.
- Good Understanding of Firewall, IDP/IPS, SIEM functioning
- Strong understanding of network protocols, TCP/IP, and security technologies.
- Familiarity with log analysis and correlation techniques.
- Knowledge of security incident response methodologies and best practices.
- Understanding of common security frameworks (e.g., NIST, ISO 27001).
- Strong analytical and problem-solving skills.
- Excellent written and verbal communication skills.