Job Description
Purpose of Role
The Security Operations Analyst is a member of the Security Operations team, reporting to the Security Operations Lead. The purpose of this role is to maintain strong oversight of the 24x7 Security Operations Centre, manage a number of operational security services related to this, review the security impact of infrastructure changes within the environment monitor & manage associated toolsets
͏
|
Key Accountabilities/Responsibilities Cyber Security Operations
Stakeholder Management
|
͏
Required Skills/Competencies
- Microsoft security suites ( Defender , Azure & Defender for Cloud )
- Experience of working in high performing teams and understanding the dynamics of teamwork in an operational security environment.
- Knowledge and operational experience in: firewalls, intrusion detection and prevention systems, anti-virus and content filtering, URL filtering, authentication solutions, Network and Cloud Architecture , Voice over IP (VoIP), firewall zoning and PKI infrastructure.
- Ability to read and understand system data including security event logs, system logs, application logs, and device logs, etc.
- Knowledge and experience of enterprise grade technologies including operating systems, databases and web applications.
- Knowledge and experience of performing network traffic analysis for identifying any developing patterns.
- Ability to work both independently and as part of a team.
- Strong analytical skills to monitor information and perform detailed data analysis to identify any vulnerabilities.
- Ability to identify and understand key issues and areas for improvement in the Information Security realm.
- Motivated to delivering quality and striving for continual improvement.
- Logical thinking and analytical ability.
- Aptitude in solving problems independently.
- Communicate and present concisely and effectively based on appropriate level of management interaction.
Desirable Skills/Competencies
- Experience with any of the following technologies: Data Loss Prevention, Intrusion Prevention/Detection Systems, Firewalls, SIEM.
- Knowledge of reporting suites such as Power BI
- Good understanding of Microsoft security suites and associated qualifications
- Threat identification
- Fundamental Cloud Concepts for AWS
- OWASP Top 10: API Security Playbook
- Security Analysis for CompTIA CySA+ or similar level of certification
- Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body
- Technical certifications by a recognised professional body in network or systems engineering
͏
͏
Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention.